Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs

Overview

General Information

Sample name:FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs
Analysis ID:1524800
MD5:4369ed90bc7fa07789bd41b3be7ca95b
SHA1:5ce66b652029364496886c36bcc945a4a1d89d08
SHA256:9af2116f48bf8770c286118e8570378987ccb3d76c214790deb92f9b2b7ae4a2
Tags:vbsuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Creates processes via WMI
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found dropped PE file which has not been started or loaded
Java / VBScript file with very long strings (likely obfuscated code)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript

Classification

  • System is w10x64
  • wscript.exe (PID: 7320 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 7380 cmdline: cmd /c copy "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exe" /Y MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7388 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs", CommandLine|base64offset|contains: -jO, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs", ProcessId: 7320, ProcessName: wscript.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: cmd /c copy "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exe" /Y, CommandLine: cmd /c copy "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exe" /Y, CommandLine|base64offset|contains: rg, Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 7320, ParentProcessName: wscript.exe, ProcessCommandLine: cmd /c copy "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exe" /Y, ProcessId: 7380, ProcessName: cmd.exe
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs", CommandLine|base64offset|contains: -jO, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs", ProcessId: 7320, ProcessName: wscript.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbsVirustotal: Detection: 15%Perma Link
Source: Binary string: powershell.pdbUGP source: FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exe.1.dr
Source: Binary string: powershell.pdb source: FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exe.1.dr

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: C:\Windows\System32\wscript.exeCOM Object queried: WBEM Locator HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}Jump to behavior
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Management and Instrumentation HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}Jump to behavior
Source: FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbsInitial sample: Strings found which are bigger than 50
Source: FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exe.1.drBinary or memory string: OriginalFilenamePowerShell.EXEj% vs FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs
Source: classification engineClassification label: mal60.winVBS@3/1@0/0
Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exeJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7388:120:WilError_03
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs"
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Windows\System32\wscript.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbsVirustotal: Detection: 15%
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe cmd /c copy "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exe" /Y
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
Source: FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbsStatic file information: File size 1957209 > 1048576
Source: Binary string: powershell.pdbUGP source: FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exe.1.dr
Source: Binary string: powershell.pdb source: FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exe.1.dr

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exeJump to dropped file
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\System32\cmd.exeDropped PE file which has not been started: C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exeJump to dropped file
Source: wscript.exe, 00000000.00000003.1855782478.00000255C35A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}tus
Source: wscript.exe, 00000000.00000003.1855782478.00000255C35A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:)
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information21
Scripting
Valid Accounts11
Windows Management Instrumentation
21
Scripting
1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Process Injection
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs11%ReversingLabs
FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs16%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exe0%ReversingLabs
C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exe0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1524800
Start date and time:2024-10-03 09:26:18 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 13s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs
Detection:MAL
Classification:mal60.winVBS@3/1@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .vbs
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exeAdjunto factura.vbsGet hashmaliciousUnknownBrowse
    DHL-AWB#TRACKING907853880911.batGet hashmaliciousAgentTeslaBrowse
      rLegalOpinionCopy_doc.cmdGet hashmaliciousVIP KeyloggerBrowse
        SKM_590813660442.batGet hashmaliciousUnknownBrowse
          Uydsrpq.cmdGet hashmaliciousPureLog StealerBrowse
            uUY8turU3x.exeGet hashmaliciousAsyncRAT, XWormBrowse
              Drawings_DIT120924120924120924120924^^.batGet hashmaliciousUnknownBrowse
                ad7268943386108805516_48334621196_24110768413395_847727572987992881.pdf.vbsGet hashmaliciousRemcosBrowse
                  DOCUMENTS.vbsGet hashmaliciousAgentTeslaBrowse
                    SKM_380785142007.batGet hashmaliciousUnknownBrowse
                      Process:C:\Windows\System32\cmd.exe
                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):433152
                      Entropy (8bit):5.502549953174867
                      Encrypted:false
                      SSDEEP:6144:MF45pGVc4sqEoWwO9sV1yZywi/PzNKXzJ7BapCK5d3klRzULOnWyjLsPhAQzqO:95pGVcwW2KXzJ4pdd3klnnWosPhnzq
                      MD5:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                      SHA1:F5EE89BB1E4A0B1C3C7F1E8D05D0677F2B2B5919
                      SHA-256:73A3C4AEF5DE385875339FC2EB7E58A9E8A47B6161BDC6436BF78A763537BE70
                      SHA-512:6E43DCA1B92FAACE0C910CBF9308CF082A38DD39DA32375FAD72D6517DEA93E944B5E5464CF3C69A61EABF47B2A3E5AA014D6F24EFA1A379D4C81C32FA39DDBC
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      Joe Sandbox View:
                      • Filename: Adjunto factura.vbs, Detection: malicious, Browse
                      • Filename: DHL-AWB#TRACKING907853880911.bat, Detection: malicious, Browse
                      • Filename: rLegalOpinionCopy_doc.cmd, Detection: malicious, Browse
                      • Filename: SKM_590813660442.bat, Detection: malicious, Browse
                      • Filename: Uydsrpq.cmd, Detection: malicious, Browse
                      • Filename: uUY8turU3x.exe, Detection: malicious, Browse
                      • Filename: Drawings_DIT120924120924120924120924^^.bat, Detection: malicious, Browse
                      • Filename: ad7268943386108805516_48334621196_24110768413395_847727572987992881.pdf.vbs, Detection: malicious, Browse
                      • Filename: DOCUMENTS.vbs, Detection: malicious, Browse
                      • Filename: SKM_380785142007.bat, Detection: malicious, Browse
                      Reputation:moderate, very likely benign file
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......".z.fg..fg..fg..x5..dg..o...lg..r...eg..r...}g..fg...g..r...cg..r...og..r...ng..r..gg..r...gg..Richfg..........................PE..L...s/.0..........................................@......................................@...... ...........................".......0...}......................|....I..T............................................ ...............................text...\........................... ..`.data...8...........................@....idata....... ......................@..@.rsrc....}...0...~..................@..@.reloc..|...........................@..B........................................................................................................................................................................................................................................................................................................
                      File type:ASCII text, with very long lines (65536), with no line terminators
                      Entropy (8bit):6.3992825123860575
                      TrID:
                        File name:FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs
                        File size:1'957'209 bytes
                        MD5:4369ed90bc7fa07789bd41b3be7ca95b
                        SHA1:5ce66b652029364496886c36bcc945a4a1d89d08
                        SHA256:9af2116f48bf8770c286118e8570378987ccb3d76c214790deb92f9b2b7ae4a2
                        SHA512:79833243bc5fe725a843c88af29f17c53d3325895d021c7dacb1c05d4aae4619fbac7f2a6ead2a3acefbb22987b775f66df052cac6425cef560a363a84398a36
                        SSDEEP:24576:cX+DnQcOHaa6pPUXFQ/ubpAAwLHhqFCYeLdTyttwPgFQHOJ8y3yY0XUlgF+/f2ta:cqEFF6OT8P4FubM
                        TLSH:8C95F0621E60DE887794B4397EBC7560D3E0EE7B2C77D6205297EB5E1B2A9400B20F71
                        File Content Preview:REM 2gPgJTCwLRyaTM1B1Oo2Gr8k+eP2O/hRA3uJHNVl0J+65orwpDf9Rp+5b18QfU6kpUL+dghiRZ4KjyG0JxBGNXsth+1fRnWHJ7JDPcyYQYUt5HaTZlqXV6Ds5RUVSR6Pczrk4vZgRV/Mdk9VHwjSck2bhkOZs84hljBNcmFgcd2UtMmSs1+PzZ8XxvAKQjiXGnLHesPb9b9rw0vGEtL+awRywWo+P77uDLikguzdFlT3tVjumfcZuL8KJvA
                        Icon Hash:68d69b8f86ab9a86
                        No network behavior found

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:03:27:16
                        Start date:03/10/2024
                        Path:C:\Windows\System32\wscript.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs"
                        Imagebase:0x7ff7634e0000
                        File size:170'496 bytes
                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:1
                        Start time:03:27:17
                        Start date:03/10/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:cmd /c copy "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\user\Desktop\FQ____RM quotation_JPEG IMAGE.img_WhatsApp.BZ2.vbs.exe" /Y
                        Imagebase:0x7ff7403d0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:03:27:17
                        Start date:03/10/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7699e0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        No disassembly