Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
7echqQm6T4.vbs

Overview

General Information

Sample name:7echqQm6T4.vbs
renamed because original name is a hash value
Original sample name:8b6023cfc635be3b5177a3c56c0fd3da.vbs
Analysis ID:1528783
MD5:8b6023cfc635be3b5177a3c56c0fd3da
SHA1:f1b0b6707360ee89c2527766bb5d083a9d1b23f9
SHA256:1285acf603d60eec23bc6bbb03f1ea9ce480af90d54ed3ee7a64e4a88cffc32e
Tags:vbsuser-abuse_ch
Infos:

Detection

Metasploit
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
VBScript performs obfuscated calls to suspicious functions
Yara detected Metasploit Payload
AI detected suspicious sample
Machine Learning detection for dropped file
Potential malicious VBS script found (has network functionality)
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
PE file contains an invalid checksum
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 7400 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7echqQm6T4.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • ZCKMveGDesw.exe (PID: 7448 cmdline: "C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe" MD5: 6E75EC809A1441CDF41202C57B899D1B)
  • cleanup
{"Type": "Metasploit Connect", "IP": "89.197.154.116", "Port": 7810}
SourceRuleDescriptionAuthorStrings
00000001.00000002.1856097476.0000000000402000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000001.00000002.1856097476.0000000000402000.00000040.00000001.01000000.00000006.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
    • 0x102:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
    SourceRuleDescriptionAuthorStrings
    1.2.ZCKMveGDesw.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
      1.2.ZCKMveGDesw.exe.400000.0.unpackWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
      • 0x502:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08

      System Summary

      barindex
      Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7echqQm6T4.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7echqQm6T4.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7echqQm6T4.vbs", ProcessId: 7400, ProcessName: wscript.exe
      Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7echqQm6T4.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7echqQm6T4.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7echqQm6T4.vbs", ProcessId: 7400, ProcessName: wscript.exe
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 7echqQm6T4.vbsAvira: detected
      Source: C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
      Source: 00000001.00000002.1856097476.0000000000402000.00000040.00000001.01000000.00000006.sdmpMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "89.197.154.116", "Port": 7810}
      Source: C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exeReversingLabs: Detection: 73%
      Source: C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exeVirustotal: Detection: 70%Perma Link
      Source: 7echqQm6T4.vbsReversingLabs: Detection: 63%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.7% probability
      Source: C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exeJoe Sandbox ML: detected

      Networking

      barindex
      Source: Initial file: xdUxOVNWNKw.SaveToFile hjAqmAfKjTOghuk, 2
      Source: global trafficTCP traffic: 192.168.2.4:49730 -> 89.197.154.116:7810
      Source: Joe Sandbox ViewIP Address: 89.197.154.116 89.197.154.116
      Source: Joe Sandbox ViewIP Address: 89.197.154.116 89.197.154.116
      Source: Joe Sandbox ViewASN Name: VIRTUAL1GB VIRTUAL1GB
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
      Source: C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exeCode function: 1_2_004020BF LoadLibraryA,WSASocketA,connect,recv,closesocket,1_2_004020BF

      System Summary

      barindex
      Source: 1.2.ZCKMveGDesw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
      Source: 00000001.00000002.1856097476.0000000000402000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
      Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
      Source: C:\Windows\System32\wscript.exeCOM Object queried: ADODB.Stream HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00000566-0000-0010-8000-00AA006D2EA4}Jump to behavior
      Source: 7echqQm6T4.vbsInitial sample: Strings found which are bigger than 50
      Source: 1.2.ZCKMveGDesw.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
      Source: 00000001.00000002.1856097476.0000000000402000.00000040.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
      Source: classification engineClassification label: mal100.troj.evad.winVBS@3/1@0/1
      Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\rad60229.tmpJump to behavior
      Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7echqQm6T4.vbs"
      Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 7echqQm6T4.vbsReversingLabs: Detection: 63%
      Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7echqQm6T4.vbs"
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe "C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe"
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe "C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe" Jump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msdart.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior

      Data Obfuscation

      barindex
      Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: \AppData\Local\Temp\rad60229.tmp");IXMLDOMNode._0000003f("<B64DECODE xmlns:dt="urn:schemas-microsoft-com:datatypes" dt:dt="bin.base64">TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9T");IXMLDOMNode.selectSingleNode("B64DECODE");IXMLDOMElement.nodeTypedValue();_Stream.Type("1");_Stream.Open();_Stream.Write("Unsupported parameter type 00002011");_Stream.SaveToFile("C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe", "2");IFileSystem3.GetSpecialFolder("2");IFolder.Path();IFileSystem3.GetTempName();IFileSystem3.CreateFolder("C:\Users\user\AppData\Local\Temp\rad60229.tmp");IXMLDOMNode._0000003f("<B64DECODE xmlns:dt="urn:schemas-microsoft-com:datatypes" dt:dt="bin.base64">TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9T");IXMLDOMNode.selectSingleNode("B64DECODE");IXMLDOMElement.nodeTypedValue();_Stream.Type("1");_Stream.Open();_Stream.Write("Unsupported parameter type 00002011");_Stream.SaveToFile("C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe", "2");IWshShell3.Run("C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe", "0", "true");IFileSystem3.GetSpecialFolder("2");IFolder.Path();IFileSystem3.GetTempName();IFileSystem3.CreateFolder("C:\Users\user\AppData\Local\Temp\rad60229.tmp");IXMLDOMNode._0000003f("<B64DECODE xmlns:dt="urn:schemas-microsoft-com:datatypes" dt:dt="bin.base64">TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9T");IXMLDOMNode.selectSingleNode("B64DECODE");IXMLDOMElement.nodeTypedValue();_Stream.Type("1");_Stream.Open();_Stream.Write("Unsupported parameter type 00002011");_Stream.SaveToFile("C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe", "2");IWshShell3.Run("C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe", "0", "true");IFileSystem3.DeleteFile("C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe")
      Source: ZCKMveGDesw.exe.0.drStatic PE information: 0x68F15ECF [Thu Oct 16 21:08:31 2025 UTC]
      Source: ZCKMveGDesw.exe.0.drStatic PE information: real checksum: 0x3a46 should be: 0xa084
      Source: ZCKMveGDesw.exe.0.drStatic PE information: section name: .data entropy: 7.471495939925764
      Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exeJump to dropped file
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
      Source: wscript.exe, 00000000.00000002.1858746137.000002BF004F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}r
      Source: ZCKMveGDesw.exe, 00000001.00000002.1856227332.00000000007AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllmm

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\System32\wscript.exeFile created: ZCKMveGDesw.exe.0.drJump to dropped file
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe "C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe" Jump to behavior
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 1.2.ZCKMveGDesw.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000001.00000002.1856097476.0000000000402000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information221
      Scripting
      Valid Accounts1
      Exploitation for Client Execution
      221
      Scripting
      11
      Process Injection
      1
      Software Packing
      OS Credential Dumping11
      Security Software Discovery
      Remote ServicesData from Local System1
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      1
      DLL Side-Loading
      11
      Process Injection
      LSASS Memory1
      File and Directory Discovery
      Remote Desktop ProtocolData from Removable Media1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      Timestomp
      Security Account Manager2
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      DLL Side-Loading
      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Obfuscated Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      7echqQm6T4.vbs63%ReversingLabsScript-WScript.Trojan.MPreter
      7echqQm6T4.vbs100%AviraHTML/ExpKit.Gen2
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe100%AviraTR/Crypt.XPACK.Gen
      C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe74%ReversingLabsWin32.Backdoor.Meterpreter
      C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe71%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      89.197.154.116
      unknownUnited Kingdom
      47474VIRTUAL1GBtrue
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1528783
      Start date and time:2024-10-08 09:52:27 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 2m 57s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:7echqQm6T4.vbs
      renamed because original name is a hash value
      Original Sample Name:8b6023cfc635be3b5177a3c56c0fd3da.vbs
      Detection:MAL
      Classification:mal100.troj.evad.winVBS@3/1@0/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 86%
      • Number of executed functions: 1
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .vbs
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      89.197.154.116PFqt5aUVdA.exeGet hashmaliciousMetasploitBrowse
      • 89.197.154.116:7810/PNs7dckO50Y1jTSMUo0osQ1uzlhrQ4w81bBqoiv31D7i0A7iSY6gyr9EVXOB4Zd_KLBxkuuRLlURC5lY_QiFvZl3k3OfdCx3N5d_lJCDWWm3XEqduXYg5vki
      CEhM4s0ZoZ.exeGet hashmaliciousMetasploitBrowse
      • 89.197.154.116:7810/VeM-buvtRWFTY1JiNZ2fGwUXc1CJXgbyOV5zM2vQ03kY7e4nGmyXkTKa8si-g-FfyAlpzs_FKQOSCtulsk34aryu-Ou9W2coAgl4jGnvIFVlgK-MlMyEitlm
      P3KxDOMmD3.exeGet hashmaliciousCobaltStrikeBrowse
      • 89.197.154.116:7810/cm
      file.exeGet hashmaliciousCobaltStrikeBrowse
      • 89.197.154.116:7810/push
      file.exeGet hashmaliciousCobaltStrikeBrowse
      • 89.197.154.116:7810/load
      file.exeGet hashmaliciousCobaltStrikeBrowse
      • 89.197.154.116:7810/ptj
      file.exeGet hashmaliciousCobaltStrikeBrowse
      • 89.197.154.116:7810/IE9CompatViewList.xml
      file.exeGet hashmaliciousCobaltStrikeBrowse
      • 89.197.154.116:7810/pixel
      ZnbEj6OQ7e.exeGet hashmaliciousCobaltStrikeBrowse
      • 89.197.154.116:7810/pixel
      YpJ4EZPgHX.exeGet hashmaliciousCobaltStrikeBrowse
      • 89.197.154.116:7810/dpixel
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      VIRTUAL1GB21GJhzRNAS.exeGet hashmaliciousMetasploitBrowse
      • 89.197.154.116
      bJ7Q5TP1uG.exeGet hashmaliciousMetasploitBrowse
      • 89.197.154.116
      Xj6IycX0ji.exeGet hashmaliciousMetasploitBrowse
      • 89.197.154.116
      PFqt5aUVdA.exeGet hashmaliciousMetasploitBrowse
      • 89.197.154.116
      CEhM4s0ZoZ.exeGet hashmaliciousMetasploitBrowse
      • 89.197.154.116
      UJTBFTCNxI.exeGet hashmaliciousMetasploitBrowse
      • 89.197.154.116
      0EkK2uIJb6.exeGet hashmaliciousMetasploitBrowse
      • 89.197.154.116
      P3KxDOMmD3.exeGet hashmaliciousCobaltStrikeBrowse
      • 89.197.154.116
      lNymIO2RVq.vbsGet hashmaliciousMetasploitBrowse
      • 89.197.154.116
      DRVf7H9j4V.exeGet hashmaliciousMetasploitBrowse
      • 89.197.154.115
      No context
      No context
      Process:C:\Windows\System32\wscript.exe
      File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
      Category:dropped
      Size (bytes):4651
      Entropy (8bit):5.935974640993666
      Encrypted:false
      SSDEEP:96:RpV+P/Qzx1m1n4dZsU3AtIrTLdHxk6nSz:1NItGLdH1Sz
      MD5:6E75EC809A1441CDF41202C57B899D1B
      SHA1:CE2FC715A04D38DA4669C897E0E70CA29C6A8386
      SHA-256:64394349D7C30B68E9B607C5FB2C22901CCC079263A802105876F439816246BF
      SHA-512:8A524E445B46808D42BE75FD7C3C9445E784797CD0040F5719980B717C2EAE104D844BEC34D4CB96608232B24F2FAC8DC284AD3B3E62F8853BDC07D076D7C57A
      Malicious:true
      Antivirus:
      • Antivirus: Avira, Detection: 100%
      • Antivirus: Joe Sandbox ML, Detection: 100%
      • Antivirus: ReversingLabs, Detection: 74%
      • Antivirus: Virustotal, Detection: 71%, Browse
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....^.h...............8..................... ....@..........................@......F:........ ..............................0..d....................................................................................................................text...(........................... .0`.data........ ...................... .0..idata..d....0......................@.0................... @.....%80@...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:ASCII text, with very long lines (6218), with CRLF, LF line terminators
      Entropy (8bit):5.07064996686479
      TrID:
      • Visual Basic Script (13500/0) 100.00%
      File name:7echqQm6T4.vbs
      File size:7'401 bytes
      MD5:8b6023cfc635be3b5177a3c56c0fd3da
      SHA1:f1b0b6707360ee89c2527766bb5d083a9d1b23f9
      SHA256:1285acf603d60eec23bc6bbb03f1ea9ce480af90d54ed3ee7a64e4a88cffc32e
      SHA512:662b19031d263206dd778b9ba15a9bfb104f571a2789da746af1000a82f90bb740cfa81c3fd151da0a2ccd050405040c94ed7fbbf82697befb2424af77dc8d73
      SSDEEP:96:aRLU5eXOqJrYi+MmxhEGWSE7ATSkHf/D0D45XbiNU1wqh:8LUpI7+Mm/EGwAhj5+NU2qh
      TLSH:C2E15D39D603FC4261221CA5E29B299CED94F98F4228CFDA4B4CD05A0DB54A3CD09AF5
      File Content Preview:Function UZEiuZKTo(ulaeVEsqOMeUND)..TvsBfUeMzES = "<B64DECODE xmlns:dt="& Chr(34) & "urn:schemas-microsoft-com:datatypes" & Chr(34) & " " & _..."dt:dt=" & Chr(34) & "bin.base64" & Chr(34) & ">" & _...ulaeVEsqOMeUND & "</B64DECODE>"..Set tvrpegBvvu = Creat
      Icon Hash:68d69b8f86ab9a86
      TimestampSource PortDest PortSource IPDest IP
      Oct 8, 2024 09:53:21.751266003 CEST497307810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:21.756366014 CEST78104973089.197.154.116192.168.2.4
      Oct 8, 2024 09:53:21.756447077 CEST497307810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:23.352991104 CEST78104973089.197.154.116192.168.2.4
      Oct 8, 2024 09:53:23.353102922 CEST497307810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:23.370865107 CEST497307810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:23.371455908 CEST497317810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:23.375711918 CEST78104973089.197.154.116192.168.2.4
      Oct 8, 2024 09:53:23.376329899 CEST78104973189.197.154.116192.168.2.4
      Oct 8, 2024 09:53:23.376419067 CEST497317810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:24.962301970 CEST78104973189.197.154.116192.168.2.4
      Oct 8, 2024 09:53:24.962570906 CEST497317810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:24.963025093 CEST497317810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:24.963701010 CEST497327810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:24.969137907 CEST78104973189.197.154.116192.168.2.4
      Oct 8, 2024 09:53:24.969875097 CEST78104973289.197.154.116192.168.2.4
      Oct 8, 2024 09:53:24.969959974 CEST497327810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:26.555811882 CEST78104973289.197.154.116192.168.2.4
      Oct 8, 2024 09:53:26.555969000 CEST497327810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:26.556209087 CEST497327810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:26.556777000 CEST497337810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:26.560964108 CEST78104973289.197.154.116192.168.2.4
      Oct 8, 2024 09:53:26.561583042 CEST78104973389.197.154.116192.168.2.4
      Oct 8, 2024 09:53:26.561655998 CEST497337810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:28.220494032 CEST78104973389.197.154.116192.168.2.4
      Oct 8, 2024 09:53:28.220587015 CEST497337810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:28.220890999 CEST497337810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:28.221513987 CEST497347810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:28.225687027 CEST78104973389.197.154.116192.168.2.4
      Oct 8, 2024 09:53:28.226342916 CEST78104973489.197.154.116192.168.2.4
      Oct 8, 2024 09:53:28.226433039 CEST497347810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:29.821266890 CEST78104973489.197.154.116192.168.2.4
      Oct 8, 2024 09:53:29.821335077 CEST497347810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:29.821783066 CEST497347810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:29.822689056 CEST497357810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:29.826538086 CEST78104973489.197.154.116192.168.2.4
      Oct 8, 2024 09:53:29.827505112 CEST78104973589.197.154.116192.168.2.4
      Oct 8, 2024 09:53:29.827574015 CEST497357810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:31.434834003 CEST78104973589.197.154.116192.168.2.4
      Oct 8, 2024 09:53:31.434962034 CEST497357810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:31.435450077 CEST497357810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:31.436534882 CEST497367810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:31.440287113 CEST78104973589.197.154.116192.168.2.4
      Oct 8, 2024 09:53:31.441415071 CEST78104973689.197.154.116192.168.2.4
      Oct 8, 2024 09:53:31.441518068 CEST497367810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:33.039959908 CEST78104973689.197.154.116192.168.2.4
      Oct 8, 2024 09:53:33.040117025 CEST497367810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:33.040508986 CEST497367810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:33.041393995 CEST497377810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:33.045310020 CEST78104973689.197.154.116192.168.2.4
      Oct 8, 2024 09:53:33.046421051 CEST78104973789.197.154.116192.168.2.4
      Oct 8, 2024 09:53:33.046523094 CEST497377810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:34.633441925 CEST78104973789.197.154.116192.168.2.4
      Oct 8, 2024 09:53:34.633558989 CEST497377810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:34.634735107 CEST497377810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:34.639542103 CEST78104973789.197.154.116192.168.2.4
      Oct 8, 2024 09:53:34.644797087 CEST497387810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:34.649849892 CEST78104973889.197.154.116192.168.2.4
      Oct 8, 2024 09:53:34.649923086 CEST497387810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:36.246202946 CEST78104973889.197.154.116192.168.2.4
      Oct 8, 2024 09:53:36.246278048 CEST497387810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:36.246685028 CEST497387810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:36.247745037 CEST497397810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:36.251430035 CEST78104973889.197.154.116192.168.2.4
      Oct 8, 2024 09:53:36.252656937 CEST78104973989.197.154.116192.168.2.4
      Oct 8, 2024 09:53:36.252724886 CEST497397810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:37.852171898 CEST78104973989.197.154.116192.168.2.4
      Oct 8, 2024 09:53:37.852293015 CEST497397810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:37.852484941 CEST497397810192.168.2.489.197.154.116
      Oct 8, 2024 09:53:37.857455015 CEST78104973989.197.154.116192.168.2.4

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:03:53:20
      Start date:08/10/2024
      Path:C:\Windows\System32\wscript.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\7echqQm6T4.vbs"
      Imagebase:0x7ff7ca850000
      File size:170'496 bytes
      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:03:53:20
      Start date:08/10/2024
      Path:C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\AppData\Local\Temp\rad60229.tmp\ZCKMveGDesw.exe"
      Imagebase:0x400000
      File size:4'651 bytes
      MD5 hash:6E75EC809A1441CDF41202C57B899D1B
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000001.00000002.1856097476.0000000000402000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000001.00000002.1856097476.0000000000402000.00000040.00000001.01000000.00000006.sdmp, Author: unknown
      Antivirus matches:
      • Detection: 100%, Avira
      • Detection: 100%, Joe Sandbox ML
      • Detection: 74%, ReversingLabs
      • Detection: 71%, Virustotal, Browse
      Reputation:low
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:47.7%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:80%
        Total number of Nodes:10
        Total number of Limit Nodes:3
        execution_graph 35 402000 36 402012 35->36 36->36 39 4020bf LoadLibraryA 36->39 40 4020e4 39->40 41 4020e6 WSASocketA 40->41 42 402102 connect 41->42 43 40211b recv 42->43 45 402111 42->45 44 402163 closesocket 43->44 43->45 44->41 44->45 45->42 45->43 45->44 46 402030 45->46

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_00402000 1 Function_004020BF 0->1

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 4020bf-4020e4 LoadLibraryA 2 4020e6-402101 WSASocketA 0->2 3 402102-40210f connect 2->3 4 402111-402114 3->4 5 40211b-40212b recv 3->5 4->3 6 402116 call 402182 4->6 7 402163-402170 closesocket 5->7 8 40212d-402141 5->8 6->5 7->2 9 402176 7->9 12 402142-402151 8->12 9->6 14 402153-40215c 12->14 15 40217b-40217f 12->15 14->7 15->12 16 402181 15->16
        APIs
        • LoadLibraryA.KERNELBASE(0726774C,?,5F327377,00003233,00000000,00401008), ref: 004020D2
        • WSASocketA.WS2_32(E0DF0FEA,00000002,00000001,00000000,00000000,00000000,00000000,821E0002,749AC559,0000000A,?,?,5F327377,00003233,00000000,00401008), ref: 004020FF
        • connect.WS2_32(6174A599,?,?,00000010,?,?,5F327377,00003233,00000000,00401008), ref: 0040210B
        • recv.WS2_32(5FC8D902,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233,00000000,00401008), ref: 00402126
        • closesocket.WS2_32(614D6E75,?,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233,00000000,00401008), ref: 00402169
        Memory Dump Source
        • Source File: 00000001.00000002.1856097476.0000000000402000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000001.00000002.1856072600.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_1_2_400000_ZCKMveGDesw.jbxd
        Yara matches
        Similarity
        • API ID: LibraryLoadSocketclosesocketconnectrecv
        • String ID:
        • API String ID: 2974377591-0
        • Opcode ID: c7dd6d1dc85f0c9f52d2a3c7a4fcb2e4ef77f3b2a73d5559232ef0d66d9328ef
        • Instruction ID: 0e749fe3c61ec416270be949d374d037d80df629f281f8c5af2d6684330048f5
        • Opcode Fuzzy Hash: c7dd6d1dc85f0c9f52d2a3c7a4fcb2e4ef77f3b2a73d5559232ef0d66d9328ef
        • Instruction Fuzzy Hash: A111A1B06802983AF53021629D4BF7B291CCB56BA8F100436BB45FD1C1C5EA9D4081FE