top title background image
flash

PUMP mt310143121.vbs

Status: finished
Submission Time: 2022-10-03 15:45:17 +02:00
Malicious
Evader
Trojan
Spyware
Exploiter
AgentTesla, GuLoader

Comments

Tags

  • GuLoader
  • vbs

Details

  • Analysis ID:
    715071
  • API (Web) ID:
    1082510
  • Analysis Started:
    2022-10-03 15:54:58 +02:00
  • Analysis Finished:
    2022-10-03 16:25:48 +02:00
  • MD5:
    41ad96654d44ef375097eeeb83818cf7
  • SHA1:
    20dae7bc9d6dc2c5f947de3f871d617fb36e6edc
  • SHA256:
    28bf271ec1576c0e7d1b2a243de952bb70c25711cdc9c2d4494002a3e2f346ca
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 56
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 100
System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
Run Condition: Suspected Instruction Hammering

Third Party Analysis Engines

malicious
Score: 5/59
malicious

IPs

IP Country Detection
142.250.186.46
United States
142.250.185.161
United States
216.218.206.36
United States

Domains

Name IP Detection
drive.google.com
142.250.186.46
googlehosted.l.googleusercontent.com
142.250.185.161
mail.prgisi.com
216.218.206.36
Click to see the 1 hidden entries
doc-04-9o-docs.googleusercontent.com
0.0.0.0

URLs

Name Detection
https://github.com/Pester/Pester
http://AzAPmg.com
https://api.ipify.org%
Click to see the 24 hidden entries
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://doc-04-9o-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/eo32nv6hlr1tkp3eh3vjbce1k0vd1dfr/1664806350000/11764323936253178614/*/1PlMJJbtOYPK_UFYPas9qhiHRn_ix8EHC?e=download&uuid=b16c09ae-0bb5-4390-9a1a-296b303d6b25
https://a1BgY4r4bA.com
https://doc-04-9o-docs.googleusercontent.com/
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
https://nuget.org/nuget.exe
https://contoso.com/
https://drive.google.com/
https://aka.ms/pscore6lB
https://a1BgY4r4bA.comt-
https://sectigo.com/CPS
http://127.0.0.1:HTTP/1.1
https://doc-04-9o-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/eo32nv6h
https://api.ipify.org%mail.prgisi.comjcvaleroso
https://support.google.com/chrome/?p=plugin_flash
http://mail.prgisi.com
https://contoso.com/Icon
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
https://contoso.com/License
http://www.apache.org/licenses/LICENSE-2.0.html
http://pesterbdd.com/images/Pester.png
https://drive.google.com/y
https://sectigo.com/CPS0
http://nuget.org/NuGet.exe

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\sepi5xx1\sepi5xx1.0.cs
UTF-8 Unicode (with BOM) text
#
C:\Users\user\AppData\Local\Temp\sepi5xx1\sepi5xx1.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
Click to see the 9 hidden entries
C:\Users\user\AppData\Local\Temp\RESA2B2.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fo0nlcmw.oxc.ps1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mfxogem4.yt2.psm1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\sepi5xx1\CSC7F7A267C826A46D5AA3589EC91649B9.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\sepi5xx1\sepi5xx1.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\sepi5xx1\sepi5xx1.out
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
#
C:\Users\user\AppData\Roaming\5drowjrx.mtw\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3036000
#
C:\Users\user\AppData\Roaming\5drowjrx.mtw\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3036000
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#