top title background image
flash

SIEM_PO00938467648.vbs

Status: finished
Submission Time: 2022-11-29 18:22:10 +01:00
Malicious
Exploiter
Evader
Trojan
Spyware
AgentTesla, GuLoader

Comments

Tags

  • vbs

Details

  • Analysis ID:
    756154
  • API (Web) ID:
    1123430
  • Analysis Started:
    2022-11-29 18:22:11 +01:00
  • Analysis Finished:
    2022-11-29 18:47:25 +01:00
  • MD5:
    633811bccf3fe62978ce41a04b653083
  • SHA1:
    bc81307b5c229094617e7cb8cdcaec55eaddad36
  • SHA256:
    b5e4225737f935940fa23989440d5ea2c123c8affde25d6d7224e2b4abab5608
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 100
System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
Run Condition: Suspected Instruction Hammering

Third Party Analysis Engines

malicious
Score: 9/26
malicious

URLs

Name Detection
http://nuget.org/NuGet.exe
http://www.apache.org/licenses/LICENSE-2.0.html7z
http://pesterbdd.com/images/Pester.png
Click to see the 10 hidden entries
http://www.apache.org/licenses/LICENSE-2.0.html
http://crl.microsof
https://contoso.com/
https://nuget.org/nuget.exe
https://contoso.com/License
https://contoso.com/Icon
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://github.com/Pester/Pester
https://github.com/Pester/Pester7z
http://pesterbdd.com/images/Pester.png7z

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\jadyuuoq\jadyuuoq.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
#
C:\Users\user\AppData\Local\Temp\jadyuuoq\jadyuuoq.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
Click to see the 6 hidden entries
C:\Users\user\AppData\Local\Temp\RES8B47.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x486, 9 symbols, created Tue Nov 29 17:24:33 2022, 1st section name ".debug$S"
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_25cruns3.fyd.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zexzdgsm.feb.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\jadyuuoq\CSC891590C19254105A6A792E8745AF5FD.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\jadyuuoq\jadyuuoq.0.cs
Unicode text, UTF-8 (with BOM) text, with very long lines (1049), with no line terminators
#
C:\Users\user\AppData\Local\Temp\jadyuuoq\jadyuuoq.out
Unicode text, UTF-8 (with BOM) text, with very long lines (443), with CRLF, CR line terminators
#