Loading ...

Play interactive tourEdit tour

Analysis Report 0HsPbXmcFf1k.vbs

Overview

General Information

Sample Name:0HsPbXmcFf1k.vbs
Analysis ID:329550
MD5:b75cacca388f6233844e2720bc52a9cd
SHA1:de080d98e0f092175d71f15d78ca92e1665edb53
SHA256:a5b2a02293e8875977dc822c8b1ca4101c2e378463018a5b6a572be559e3abb4

Most interesting Screenshot:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
VBScript performs obfuscated calls to suspicious functions
Yara detected Ursnif
Creates processes via WMI
Deletes itself after installation
Machine Learning detection for dropped file
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains capabilities to detect virtual machines
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device

Classification

Startup

  • System is w10x64
  • wscript.exe (PID: 3448 cmdline: C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\0HsPbXmcFf1k.vbs' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • iexplore.exe (PID: 1948 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6232 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1948 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000003.444347037.0000000005458000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000003.00000003.444433132.0000000005458000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000003.00000003.444295497.0000000005458000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000003.00000003.444442868.0000000005458000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000003.00000002.445790289.0000000005458000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 4 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for domain / URLShow sources
            Source: api10.laptok.atVirustotal: Detection: 12%Perma Link
            Source: http://api10.laptok.at/favicon.icoVirustotal: Detection: 12%Perma Link
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\Temp\magnesia.xcodeprojMetadefender: Detection: 18%Perma Link
            Source: C:\Users\user\AppData\Local\Temp\magnesia.xcodeprojReversingLabs: Detection: 32%
            Machine Learning detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\Temp\magnesia.xcodeprojJoe Sandbox ML: detected
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Local\Temp
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Desktop\desktop.ini
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Documents\desktop.ini
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Local
            Source: Joe Sandbox ViewIP Address: 47.241.19.44 47.241.19.44
            Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC
            Source: global trafficHTTP traffic detected: GET /api1/up8ONzjM/NUlpC0iTl8QPTXkOW4B0HW_/2BJhTzjeJq/8OY5q_2FvwI2aBOZa/blCNrgbOTsXG/HhSGjlZAz75/MGS0M3hXIYptAx/t_2BV8CyK5tAOx9S5ETcL/RfswvYGcruz09Ttu/liLSJkBAsVxHqgz/lU4z93taaS3OdirxC8/XaU5JN3Fl/kDBJId8zKh02ccx1lAnJ/hYXmd9L_2FBIPWbwnnA/RUKF8siFTAyjQU0l65PXXn/uAbc5e9Igb03_/2Bph4va6/5CKxcM_0A_0DG5URWLIjFfc/_2BGXTJPcZ/281nTqW9aBaFUw_2F/4c_2FBISILQC/Ywr7kYPa7W2/Rgd_2BAEKFtO/GAw HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: api10.laptok.atConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: api10.laptok.atConnection: Keep-Alive
            Source: msapplication.xml0.26.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xca22f249,0x01d6d02f</date><accdate>0xca22f249,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
            Source: msapplication.xml0.26.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xca22f249,0x01d6d02f</date><accdate>0xca2554d3,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
            Source: msapplication.xml5.26.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xca27b70e,0x01d6d02f</date><accdate>0xca27b70e,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
            Source: msapplication.xml5.26.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xca27b70e,0x01d6d02f</date><accdate>0xca27b70e,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
            Source: msapplication.xml7.26.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xca2c7bae,0x01d6d02f</date><accdate>0xca2c7bae,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
            Source: msapplication.xml7.26.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xca2c7bae,0x01d6d02f</date><accdate>0xca2c7bae,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
            Source: unknownDNS traffic detected: queries for: api10.laptok.at
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 11 Dec 2020 17:37:23 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingContent-Encoding: gzipData Raw: 36 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 40 11 1b 7d a8 34 c8 6c a0 22 28 2f 2f 3d 33 af 02 59 4e 1f 66 9a 3e d4 25 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6a(HML),I310Q/Qp/K&T";Ct@}4l"(//=3YNf>%a30
            Source: {F3DA31CA-3C22-11EB-90E4-ECF4BB862DED}.dat.26.drString found in binary or memory: http://api10.laptok.at/api1/up8ONzjM/NUlpC0iTl8QPTXkOW4B0HW_/2BJhTzjeJq/8OY5q_2FvwI2aBOZa/blCNrgbOTs
            Source: msapplication.xml.26.drString found in binary or memory: http://www.amazon.com/
            Source: msapplication.xml1.26.drString found in binary or memory: http://www.google.com/
            Source: msapplication.xml2.26.drString found in binary or memory: http://www.live.com/
            Source: msapplication.xml3.26.drString found in binary or memory: http://www.nytimes.com/
            Source: msapplication.xml4.26.drString found in binary or memory: http://www.reddit.com/
            Source: msapplication.xml5.26.drString found in binary or memory: http://www.twitter.com/
            Source: msapplication.xml6.26.drString found in binary or memory: http://www.wikipedia.com/
            Source: msapplication.xml7.26.drString found in binary or memory: http://www.youtube.com/

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000003.00000003.444347037.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444433132.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444295497.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444442868.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.445790289.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444323990.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444401752.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444370591.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444420524.0000000005458000.00000004.00000040.sdmp, type: MEMORY

            E-Banking Fraud:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000003.00000003.444347037.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444433132.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444295497.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444442868.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.445790289.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444323990.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444401752.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444370591.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444420524.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\magnesia.xcodeproj CEA0B6B83210A878E1BCC0C792658CA341911E8C43FDE86524501D265C8BAE16
            Source: 0HsPbXmcFf1k.vbsInitial sample: Strings found which are bigger than 50
            Source: magnesia.xcodeproj.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal100.troj.evad.winVBS@4/20@1/1
            Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
            Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\adobe.urlJump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\0HsPbXmcFf1k.vbs'
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Windows\System32\wscript.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\0HsPbXmcFf1k.vbs'
            Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
            Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1948 CREDAT:17410 /prefetch:2
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1948 CREDAT:17410 /prefetch:2
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
            Source: Binary string: c:\personthought\Voicehave\WhetherSeem\SpendGame\ThoughtHer\bit.pdb0B source: wscript.exe, 00000000.00000003.234550233.00000205400E6000.00000004.00000001.sdmp, magnesia.xcodeproj.0.dr
            Source: Binary string: c:\personthought\Voicehave\WhetherSeem\SpendGame\ThoughtHer\bit.pdb source: wscript.exe, 00000000.00000003.234550233.00000205400E6000.00000004.00000001.sdmp, magnesia.xcodeproj.0.dr

            Data Obfuscation:

            barindex
            VBScript performs obfuscated calls to suspicious functionsShow sources
            Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.ScriptName, cStr(649374277)) > 0 And KPEkhN = 0) ThenExit FunctionEnd If' harbinger gigging supervene patient pink ingest Levitt Shari Manhattan sawmill elucidate171 cereus catastrophe Carolingian597 imbalance Scott avionic augment Daley proboscis Singapore mycobacteria completion listen. pamper nutrition Agee ripple stockbroker repelling appraise tube solicitous pragmatic heartland Rochester Goodwin. agone Gascony umpire megohm punk leatherwork thrifty ambiguity henceforth TV flounce clairvoyant astronomer hall icicle casework rainstorm salesman accordion. rabbinical. chive extraordinary curlew gauze Set qrkNb = GetObject("winmgmts:\\.\root\cimv2")Set PMWjUlItems = qrkNb.ExecQuery("Select * from Win32_Processor", , (182 - ((69 - 4.0) + (30 + 39.0))))' trackage posable council desire straightaway Nikko geophysics anthem beater, Dada heat jettison backstage brant screed fetus, sough gesture uremia, 1631324 woody mitre guild toponymy dusky345 alphabetic Pegasus Skippy. Rawlinson moss stripe parse Jed halma. cane. 8911536 silicic Goff pitman torr angel backfill gar46 billet, 9998939 sausage. postpone bistate nightfall inane smooth civilian, 9785974 constraint haplology Mekong knead decontrolled nimble dynamite ignore consultation equipoise For Each ZhxjBO In PMWjUlItemsREM raunchy monic raucous phosphorescent, faint Patsy inviolable floruit gs Edward honorarium epiphysis. katydid brighten abc pyrotechnic audacious counterproposal analyst doeuvre Burnside jerry Ito181 exotica. 3356268 pewter416 architectural fascicle346 swivel import cherubim807 pulley fluid soignee Barnum. strengthen storefront580 during theory rheostat Borealis Wesleyan Bologna Vernon alpaca t profile accelerate switchman buckhorn facetious eyelet mercer629 stumpy Columbus documentation collector chemistry reduce Moser bail behold buttonhole neuritis Topeka deerstalker mantis auntie Vreeland earnest. 7086757 REM copulate quirk613 armature eminent Hermite striate, horizon Permian expiration lotus concubine sagacious. erg Byzantine seek Broadway bossy, kittenish vagrant, 4130644 Tantric Gilead Harmon whatre Goldstein Heuser wardrobe giddy plague Hertzog marksmen Dahl bowmen deconvolution cessation clitoris impel dubious haggard stifle possessive, hectic peek postorder march emphases Stevenson, If ZhxjBO.NumberOfCores < ((56 + (-40.0)) + (-(1305 - (96 + 1196.0)))) ThenIVyhS = TrueEnd IfNextIf IVyhS ThenJyWHJqREM confess casino veterinary hydroxy chartreuse buzzy subsume. Darwin buteo Nazism flourish sorrel Agatha32 whereon supervisory266 seasonal firecracker diode Lauderdale psychophysic suffer jowl, Lisa sclerotic militia grantee mambo contrition Pennsylvania wysiwyg progenitor Montgomery Natchez witness TOEFL orthorhombic fate anticipatory poignant trot inflammatory bulbous sawyer sequin mutagen complimentary thymus tie. swag horseback counterclockwise headdress puffball suntanning End IfEnd FunctionFunction Kelley()If (InStr(WScript.ScriptName, "TESTING") > 0) ThenEx
            Source: magnesia.xcodeproj.0.drStatic PE information: real checksum: 0x37c70 should be: 0x37c79

            Persistence and Installation Behavior:

            barindex
            Creates processes via WMIShow sources
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\magnesia.xcodeprojJump to dropped file
            Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\magnesia.xcodeprojJump to dropped file

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000003.00000003.444347037.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444433132.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444295497.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444442868.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.445790289.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444323990.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444401752.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444370591.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444420524.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Deletes itself after installationShow sources
            Source: C:\Windows\System32\wscript.exeFile deleted: c:\users\user\desktop\0hspbxmcff1k.vbsJump to behavior
            Source: C:\Windows\System32\wscript.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)Show sources
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_LogicalDisk
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: SANDBOXIEDCOMLAUNCH.EXE{
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: AUTORUNSC.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: EMUL.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: SBIECTRL.EXE
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: AUTORUNSC.EXEX
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: APISPY.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: $FAKEHTTPSERVER.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: FAKEHTTPSERVER.EXE@
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: REGMON.EXEIK
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: WINDBG.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: SCKTOOL.EXE;HQ
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: IDAQ.EXET
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: BEHAVIORDUMPER.EXE@Q
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: WINDUMP.EXE
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: IMPORTREC.EXE@
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: HOOKEXPLORER.EXE@
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: FORTITRACER.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: SYSANALYZER.EXEA
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: APISPY.EXE@
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: IMUL.EXE@.8
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: SANDBOXIERPCSS.EXE:@V5
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: PETOOLS.EXEJ
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: PROCMON.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: HOOKEXPLORER.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: NETSNIFFER.EXEK
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: PEID.EXE@#Z
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: AUTORUNS.EXE@
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: HOOKANAAPP.EXE@
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: IDAG.EXE:V
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: WIRESHARK.EXE@
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: REGSHOT.EXE
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: SYSANALYZER.EXE@A
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: WIRESHARK.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: FORTITRACER.EXEA
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: OLLYDBG.EXEP
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: PROCMON.EXE@
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: SBIESVC.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: IMPORTREC.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: FILEMON.EXE@T
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: IMUL.EXE.8
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: Q?$SANDBOXIERPCSS.EXEV5
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: IDAG.EXE@:V
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: WINDUMP.EXE@
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: :FRIDA-WINJECTOR-HELPER-32.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: PEID.EXE#Z
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: IDAQ.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: OLLYDBG.EXE
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-64.EXE@
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: PETOOLS.EXE@J
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: AUTORUNS.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: HOOKANAAPP.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: NETSNIFFER.EXE@K
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: :FRIDA-WINJECTOR-HELPER-64.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: TCPDUMP.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: FILEMON.EXET
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: U.SANDBOXIEDCOMLAUNCH.EXE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: A9$BEHAVIORDUMPER.EXEQ
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: SCKTOOL.EXE
            Source: wscript.exe, 00000000.00000002.250885232.000002053E1D4000.00000004.00000001.sdmpBinary or memory string: CARGILL = ARRAY("FRIDA-WINJECTOR-HELPER-64.EXE","FRIDA-WINJECTOR-HELPER-32.EXE","PYTHONW.EXE","PYW.EXE","CMDVIRTH.EXE","ALIVE.EXE","FILEWATCHERSERVICE.EXE","NGVMSVC.EXE","SANDBOXIERPCSS.EXE","ANALYZER.EXE","FORTITRACE
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: DUMPCAP.EXE
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-32.EXECKSA@
            Source: C:\Windows\System32\wscript.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\magnesia.xcodeprojJump to dropped file
            Source: C:\Windows\System32\wscript.exe TID: 5752Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
            Source: C:\Windows\System32\wscript.exeFile Volume queried: C:\Users\user\AppData\Local FullSizeInformation
            Source: C:\Windows\System32\wscript.exeFile Volume queried: C:\Users\user\AppData\Local\Temp FullSizeInformation
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Local\Temp
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Desktop\desktop.ini
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Documents\desktop.ini
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Local
            Source: wscript.exe, 00000000.00000002.254514322.0000020544530000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: wscript.exe, 00000000.00000002.254514322.0000020544530000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: wscript.exe, 00000000.00000002.254514322.0000020544530000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: wscript.exe, 00000000.00000002.254267241.0000020541BD9000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: wscript.exe, 00000000.00000002.254514322.0000020544530000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Benign windows process drops PE filesShow sources
            Source: C:\Windows\System32\wscript.exeFile created: magnesia.xcodeproj.0.drJump to dropped file
            Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Florentine.zip VolumeInformation
            Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Florentine.zip VolumeInformation
            Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Florentine.zip VolumeInformation
            Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Florentine.zip VolumeInformation
            Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Florentine.zip VolumeInformation
            Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Florentine.zip VolumeInformation
            Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Florentine.zip VolumeInformation
            Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Florentine.zip VolumeInformation
            Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Florentine.zip VolumeInformation
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: procmon.exe
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: tcpview.exe
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: wireshark.exe
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: avz.exe
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: cports.exe
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: lordpe.exe
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: icesword.exe
            Source: wscript.exe, 00000000.00000003.250313883.000002054008A000.00000004.00000001.sdmpBinary or memory string: autoruns.exe
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: ollydbg.exe
            Source: wscript.exe, 00000000.00000003.239249782.00000205400AD000.00000004.00000001.sdmpBinary or memory string: regshot.exe

            Stealing of Sensitive Information:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000003.00000003.444347037.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444433132.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444295497.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444442868.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.445790289.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444323990.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444401752.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444370591.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444420524.0000000005458000.00000004.00000040.sdmp, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000003.00000003.444347037.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444433132.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444295497.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444442868.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.445790289.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444323990.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444401752.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444370591.0000000005458000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.444420524.0000000005458000.00000004.00000040.sdmp, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation221Path InterceptionProcess Injection1Masquerading11OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumIngress Tool Transfer3Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScripting121Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion4LSASS MemorySecurity Software Discovery341Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsExploitation for Client Execution1Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerVirtualization/Sandbox Evasion4SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting121NTDSFile and Directory Discovery2Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsSystem Information Discovery24SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsFile Deletion1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            No Antivirus matches

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\magnesia.xcodeproj100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\magnesia.xcodeproj22%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\magnesia.xcodeproj32%ReversingLabsWin32.Worm.Cridex

            Unpacked PE Files

            No Antivirus matches

            Domains

            SourceDetectionScannerLabelLink
            api10.laptok.at12%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://www.wikipedia.com/0%URL Reputationsafe
            http://www.wikipedia.com/0%URL Reputationsafe
            http://www.wikipedia.com/0%URL Reputationsafe
            http://www.wikipedia.com/0%URL Reputationsafe
            http://api10.laptok.at/favicon.ico13%VirustotalBrowse
            http://api10.laptok.at/favicon.ico0%Avira URL Cloudsafe
            http://api10.laptok.at/api1/up8ONzjM/NUlpC0iTl8QPTXkOW4B0HW_/2BJhTzjeJq/8OY5q_2FvwI2aBOZa/blCNrgbOTsXG/HhSGjlZAz75/MGS0M3hXIYptAx/t_2BV8CyK5tAOx9S5ETcL/RfswvYGcruz09Ttu/liLSJkBAsVxHqgz/lU4z93taaS3OdirxC8/XaU5JN3Fl/kDBJId8zKh02ccx1lAnJ/hYXmd9L_2FBIPWbwnnA/RUKF8siFTAyjQU0l65PXXn/uAbc5e9Igb03_/2Bph4va6/5CKxcM_0A_0DG5URWLIjFfc/_2BGXTJPcZ/281nTqW9aBaFUw_2F/4c_2FBISILQC/Ywr7kYPa7W2/Rgd_2BAEKFtO/GAw0%Avira URL Cloudsafe
            http://api10.laptok.at/api1/up8ONzjM/NUlpC0iTl8QPTXkOW4B0HW_/2BJhTzjeJq/8OY5q_2FvwI2aBOZa/blCNrgbOTs0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            api10.laptok.at
            47.241.19.44
            truetrueunknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            http://api10.laptok.at/favicon.icotrue
            • 13%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://api10.laptok.at/api1/up8ONzjM/NUlpC0iTl8QPTXkOW4B0HW_/2BJhTzjeJq/8OY5q_2FvwI2aBOZa/blCNrgbOTsXG/HhSGjlZAz75/MGS0M3hXIYptAx/t_2BV8CyK5tAOx9S5ETcL/RfswvYGcruz09Ttu/liLSJkBAsVxHqgz/lU4z93taaS3OdirxC8/XaU5JN3Fl/kDBJId8zKh02ccx1lAnJ/hYXmd9L_2FBIPWbwnnA/RUKF8siFTAyjQU0l65PXXn/uAbc5e9Igb03_/2Bph4va6/5CKxcM_0A_0DG5URWLIjFfc/_2BGXTJPcZ/281nTqW9aBaFUw_2F/4c_2FBISILQC/Ywr7kYPa7W2/Rgd_2BAEKFtO/GAwtrue
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.wikipedia.com/msapplication.xml6.26.drfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.amazon.com/msapplication.xml.26.drfalse
              high
              http://www.nytimes.com/msapplication.xml3.26.drfalse
                high
                http://www.live.com/msapplication.xml2.26.drfalse
                  high
                  http://api10.laptok.at/api1/up8ONzjM/NUlpC0iTl8QPTXkOW4B0HW_/2BJhTzjeJq/8OY5q_2FvwI2aBOZa/blCNrgbOTs{F3DA31CA-3C22-11EB-90E4-ECF4BB862DED}.dat.26.drtrue
                  • Avira URL Cloud: safe
                  unknown
                  http://www.reddit.com/msapplication.xml4.26.drfalse
                    high
                    http://www.twitter.com/msapplication.xml5.26.drfalse
                      high
                      http://www.youtube.com/msapplication.xml7.26.drfalse
                        high

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        47.241.19.44
                        unknownUnited States
                        45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCtrue

                        General Information

                        Joe Sandbox Version:31.0.0 Red Diamond
                        Analysis ID:329550
                        Start date:11.12.2020
                        Start time:18:34:42
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 6m 0s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:0HsPbXmcFf1k.vbs
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:38
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.evad.winVBS@4/20@1/1
                        EGA Information:Failed
                        HDC Information:Failed
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .vbs
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, RuntimeBroker.exe, backgroundTaskHost.exe, UsoClient.exe, audiodg.exe, rundll32.exe, BackgroundTransferHost.exe, ielowutil.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 52.147.198.201, 13.64.90.137, 23.210.248.85, 51.104.144.132, 20.190.129.17, 40.126.1.145, 40.126.1.166, 20.190.129.2, 40.126.1.128, 20.190.129.24, 20.190.129.160, 20.190.129.19, 92.122.213.247, 92.122.213.194, 204.79.197.200, 13.107.21.200, 88.221.62.148, 20.54.26.129, 92.122.145.220, 152.199.19.161
                        • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, www.tm.a.prd.aadg.trafficmanager.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, e12564.dspb.akamaiedge.net, go.microsoft.com, login.live.com, www-bing-com.dual-a-0001.a-msedge.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, www.bing.com, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, dual-a-0001.a-msedge.net, ie9comview.vo.msecnd.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, login.msa.msidentity.com, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, dub2.next.a.prd.aadg.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net, cs9.wpc.v0cdn.net
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtEnumerateKey calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        18:35:46API Interceptor1x Sleep call for process: wscript.exe modified

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        47.241.19.440LC6H9UPa7cv.vbsGet hashmaliciousBrowse
                        • api10.laptok.at/favicon.ico
                        0AQ7y0jQVHeA.vbsGet hashmaliciousBrowse
                        • api10.laptok.at/favicon.ico
                        3a07d9bd-1b72-4b18-a990-8f53801474f5.vbsGet hashmaliciousBrowse
                        • api10.laptok.at/favicon.ico
                        5Dk2HB4IS3dn.vbsGet hashmaliciousBrowse
                        • api10.laptok.at/favicon.ico
                        JFCp0yRoUS1z.vbsGet hashmaliciousBrowse
                        • api10.laptok.at/favicon.ico
                        kj3D6ZRVe22Y.vbsGet hashmaliciousBrowse
                        • api10.laptok.at/favicon.ico
                        onerous.tar.dllGet hashmaliciousBrowse
                        • c56.lepini.at/jvassets/xI/t64.dat
                        0xyZ4rY0opA2.vbsGet hashmaliciousBrowse
                        • c56.lepini.at/jvassets/xI/t64.dat
                        6Xt3u55v5dAj.vbsGet hashmaliciousBrowse
                        • c56.lepini.at/jvassets/xI/t64.dat
                        JeSoTz0An7tn.vbsGet hashmaliciousBrowse
                        • c56.lepini.at/jvassets/xI/t64.dat
                        1qdMIsgkbwxA.vbsGet hashmaliciousBrowse
                        • c56.lepini.at/jvassets/xI/t64.dat
                        2Q4tLHa5wbO1.vbsGet hashmaliciousBrowse
                        • c56.lepini.at/jvassets/xI/t64.dat
                        0wDeH3QW0mRu.vbsGet hashmaliciousBrowse
                        • c56.lepini.at/jvassets/xI/t64.dat
                        0k4Vu1eOEIhU.vbsGet hashmaliciousBrowse
                        • c56.lepini.at/jvassets/xI/t64.dat
                        earmarkavchd.dllGet hashmaliciousBrowse
                        • c56.lepini.at/jvassets/xI/t64.dat
                        6znkPyTAVN7V.vbsGet hashmaliciousBrowse
                        • c56.lepini.at/jvassets/xI/t64.dat
                        a7APrVP2o2vA.vbsGet hashmaliciousBrowse
                        • c56.lepini.at/jvassets/xI/t64.dat
                        03QKtPTOQpA1.vbsGet hashmaliciousBrowse
                        • c56.lepini.at/jvassets/xI/t64.dat
                        2200.dllGet hashmaliciousBrowse
                        • c56.lepini.at/jvassets/xI/t64.dat
                        22.dllGet hashmaliciousBrowse
                        • api10.laptok.at/favicon.ico

                        Domains

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        api10.laptok.at0LC6H9UPa7cv.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        0AQ7y0jQVHeA.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        3a07d9bd-1b72-4b18-a990-8f53801474f5.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        5Dk2HB4IS3dn.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        JFCp0yRoUS1z.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        kj3D6ZRVe22Y.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        onerous.tar.dllGet hashmaliciousBrowse
                        • 47.241.19.44
                        0xyZ4rY0opA2.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        6Xt3u55v5dAj.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        JeSoTz0An7tn.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        1qdMIsgkbwxA.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        2Q4tLHa5wbO1.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        0wDeH3QW0mRu.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        0k4Vu1eOEIhU.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        earmarkavchd.dllGet hashmaliciousBrowse
                        • 47.241.19.44
                        6znkPyTAVN7V.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        a7APrVP2o2vA.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        03QKtPTOQpA1.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        2200.dllGet hashmaliciousBrowse
                        • 47.241.19.44
                        22.dllGet hashmaliciousBrowse
                        • 47.241.19.44

                        ASN

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC0LC6H9UPa7cv.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        0AQ7y0jQVHeA.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        9OJqQY1kWMGet hashmaliciousBrowse
                        • 47.254.175.73
                        https://bit.ly/36RY32kGet hashmaliciousBrowse
                        • 8.208.92.142
                        M9SEr6SviKGet hashmaliciousBrowse
                        • 8.211.35.113
                        EJG80crXtR.exeGet hashmaliciousBrowse
                        • 8.208.94.234
                        https://bit.ly/2K1XB8TGet hashmaliciousBrowse
                        • 8.208.92.142
                        https://bit.ly/3gpTr6NGet hashmaliciousBrowse
                        • 8.208.92.142
                        #PO-NX--LI-2-12-20.jpg.exeGet hashmaliciousBrowse
                        • 161.117.47.123
                        proceed.exeGet hashmaliciousBrowse
                        • 47.52.39.5
                        https://bit.ly/3n5MZ7eGet hashmaliciousBrowse
                        • 8.208.92.142
                        3a07d9bd-1b72-4b18-a990-8f53801474f5.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        http://bit.ly/2JIzxYBGet hashmaliciousBrowse
                        • 47.254.170.17
                        com.screw.fancy.clean.apkGet hashmaliciousBrowse
                        • 8.211.35.113
                        com.screw.fancy.clean.apkGet hashmaliciousBrowse
                        • 8.211.35.113
                        http://jvqh.dunoq.com/indexGet hashmaliciousBrowse
                        • 8.208.98.199
                        https://glwyjxclsqtwzvmay4btva-on.drv.tw/poiugfdsdfgh/ouyteghxvx.html?c=blah@fake.email.caGet hashmaliciousBrowse
                        • 47.254.47.165
                        5Dk2HB4IS3dn.vbsGet hashmaliciousBrowse
                        • 47.241.19.44
                        z3UXCVfI3M.docGet hashmaliciousBrowse
                        • 47.244.28.71
                        z3UXCVfI3M.docGet hashmaliciousBrowse
                        • 47.244.28.71

                        JA3 Fingerprints

                        No context

                        Dropped Files

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        C:\Users\user\AppData\Local\Temp\magnesia.xcodeproj5Dk2HB4IS3dn.vbsGet hashmaliciousBrowse

                          Created / dropped Files

                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F3DA31C8-3C22-11EB-90E4-ECF4BB862DED}.dat
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:Microsoft Word Document
                          Category:dropped
                          Size (bytes):29272
                          Entropy (8bit):1.7732471222344517
                          Encrypted:false
                          SSDEEP:48:IwWGcprrGwpL7G/ap8brGIpcvYnGvnZpvvY6GoQqp9vYwGo4BpmvXICGWe+IGWsu:rKZlZb2b9WvRtvXfvcBMvYhi8zB
                          MD5:0AFDAF65EA81AF0A827F00D650C5DBA2
                          SHA1:C4A303EB59B9FCF71C192F93BC630154960E217B
                          SHA-256:AE3B534BAAB4BB90C12F87D614AFBE8CC95ED36F7D574506C5609A0B2BC07FEE
                          SHA-512:1CA13A7133D52A381891133E478B1B688E469E48CF2CFA6C79A429EEE50B0E620F7D4A2B07817B879FD1C50D742CF1D67A0560332C3569F33F1A6A47A18B7857
                          Malicious:false
                          Reputation:low
                          Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{F3DA31CA-3C22-11EB-90E4-ECF4BB862DED}.dat
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:Microsoft Word Document
                          Category:dropped
                          Size (bytes):28164
                          Entropy (8bit):1.9262350350929902
                          Encrypted:false
                          SSDEEP:192:rZZ2QO6gkyFjnBv2nDckWnpMn0YVBMmCIEVBMmw9mCItWA:rPDZtyhnBenDInyn08BcvBO6B
                          MD5:A9DDE7976C9B0CA558798CD4F9E50639
                          SHA1:AB934CECEA3D3C69F741043C78D142F98C95500B
                          SHA-256:59B23A55F1C8BD13827B25A8A5837E8EBA03C3EE0C77364803F29DFE9FA0DF5B
                          SHA-512:744DCB1D6275BED334B4FFF96231B864CF594A6F5F45BD91A396D915E925C0355BD5A31EDB1D1DA6B4B4C6CFB1D82CC7862777C44CA8F5C04D59FDA7AA9E38D3
                          Malicious:false
                          Reputation:low
                          Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):656
                          Entropy (8bit):5.063027570586374
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxOEzw90vw9mnWimI002EtM3MHdNMNxOEzw90vw9mnWimI00ObVbkEtMb:2d6NxOeSZHKd6NxOeSZ76b
                          MD5:56F5EB7A3AF12B4FA3F725427F6F46A6
                          SHA1:14B8E5E62A7695A979D36EB91F6E4A0363EB5A8C
                          SHA-256:9A3FB4676E82595127D8CF426CBAE3332B5C214B26B0E359290DC7677EE37024
                          SHA-512:71DC0A373492C4E5F253888B79E122CD5C82C7A9FD475F9467543C076134BBDA43A0FA299E7ED0D60ED35BFD09AF2AE01162CB959D4AC92CBA0C8FFC34F8772E
                          Malicious:false
                          Reputation:low
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xca27b70e,0x01d6d02f</date><accdate>0xca27b70e,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xca27b70e,0x01d6d02f</date><accdate>0xca27b70e,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):653
                          Entropy (8bit):5.096574354389015
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxe2kC2LYN90W2LYN9mnWimI002EtM3MHdNMNxe2kC2LYN90W2LYN9mnWT:2d6NxrrSYLSYWSZHKd6NxrrSYLSYWSZ/
                          MD5:9161EFFEB55E7A3F431D54C8B4AAD96D
                          SHA1:DC09C923029555A4E3C2124193BD22C922481C60
                          SHA-256:555A05679C10EFFA726251D7B5562DDCB9A61CD7A41E891C6E03D57E2589C8DB
                          SHA-512:DD602A8079CD22564E31318844E6D390C91354201F451E68AB3FED318DD21632E0325AC77D95302B3AE65FE4689FD4BE1F38AB8FBE9DF9A64A2814742F859EC7
                          Malicious:false
                          Reputation:low
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xca208fe4,0x01d6d02f</date><accdate>0xca208fe4,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xca208fe4,0x01d6d02f</date><accdate>0xca208fe4,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):662
                          Entropy (8bit):5.090695127526111
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxvLzw90vw9mnWimI002EtM3MHdNMNxvLzw90U9mnWimI00ObmZEtMb:2d6NxvbSZHKd6NxvfSZ7mb
                          MD5:BCEF70F9C3999124732DF696B8D3D967
                          SHA1:3D39D9FDE599DD2FF259159E115D491BAB676887
                          SHA-256:5C5E46BD7E4E8BCB453663FB42AA3EF11081DA31F8B50F7566D61F6D026CAEE5
                          SHA-512:9E25EB4F3EF6B8FE3B574B345F71A39178EBF53DE40D51F82BACBDD8974A69D6A008ED7A3ADCD08F13FB5549EC5C418D5FE38CAB6DBFEF4132996EF3CB3BF1FB
                          Malicious:false
                          Reputation:low
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xca27b70e,0x01d6d02f</date><accdate>0xca27b70e,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xca27b70e,0x01d6d02f</date><accdate>0xca2a195c,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):647
                          Entropy (8bit):5.113045868374434
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxie90C9mnWimI002EtM3MHdNMNxie90C9mnWimI00Obd5EtMb:2d6Nx4SZHKd6Nx4SZ7Jjb
                          MD5:452884E31871DB6DEFD6090B91A2338B
                          SHA1:1F7AF7CF08F4DBFADBF306C24B3E5F2512028C49
                          SHA-256:E4EF2808A22708B5748950A70AE711171EA75E8B8170852DBB62A9CD479649DE
                          SHA-512:090209589B3395327CB8768D6A5D8595AFCFC898DC0BBDBEE3CF85C4E555489108285B0DF03BBDC985F5D6757544BC7F2EBDEF29E44BA4E2093E2698EC7B61F4
                          Malicious:false
                          Reputation:low
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xca2554d3,0x01d6d02f</date><accdate>0xca2554d3,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xca2554d3,0x01d6d02f</date><accdate>0xca2554d3,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):656
                          Entropy (8bit):5.083300217697363
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxhGwEq904q9mnWimI002EtM3MHdNMNxhGwEq904q9mnWimI00Ob8K075t:2d6NxQdczSZHKd6NxQdczSZ7YKajb
                          MD5:E21FE5C20A90040624DA8A9801354ABB
                          SHA1:046FBFF1EB170378BBFCD7E632D17E2F923A70E3
                          SHA-256:0A9FE499A7387641DDBBB7337BB679D38231C29350AA6F16309B69EF2DE98F95
                          SHA-512:71CB192936D0B596AEF8A1B02D59D7F9EA4DFD5BB821C6193A087BFB754AED5D7E966B9C56092148F00A058580501557BCF63C5A2F8C1CCEF106D2C3E7168B9A
                          Malicious:false
                          Reputation:low
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xca2c7bae,0x01d6d02f</date><accdate>0xca2c7bae,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xca2c7bae,0x01d6d02f</date><accdate>0xca2c7bae,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):653
                          Entropy (8bit):5.063622299450696
                          Encrypted:false
                          SSDEEP:12:TMHdNMNx0nzw90vw9mnWimI002EtM3MHdNMNx0nzw90vw9mnWimI00ObxEtMb:2d6Nx0vSZHKd6Nx0vSZ7nb
                          MD5:90B850EECA5829223A60C20A3684A1CB
                          SHA1:16807A05E6C378056EE42CEEBC90A5A3204ED67D
                          SHA-256:03365F5705AAC55A9EDF0EFED207875D6FD357F8DDC8A73679CD7678019F1908
                          SHA-512:26737156E8CF0EA331EBE73215756F30D3796B8AA235058463FD4F197804EBF2C4FABEA8730673FECB3AFFA628D43E1AB6DEF3C2045933754571538A48CD2405
                          Malicious:false
                          Reputation:low
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xca27b70e,0x01d6d02f</date><accdate>0xca27b70e,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xca27b70e,0x01d6d02f</date><accdate>0xca27b70e,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):656
                          Entropy (8bit):5.136401353836368
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxxe90C9mnWimI002EtM3MHdNMNxxe90vw9mnWimI00Ob6Kq5EtMb:2d6NxdSZHKd6NxzSZ7ob
                          MD5:E7D98B8AFFAE73E9DA554F68C62958A5
                          SHA1:4EC7980569A59DAC3DB1DC818548FD8DA56B44B8
                          SHA-256:BC25DDA0EA3416BF10F9EF6F2B50177A09E2D562DA34D2F00392147B8AAAFFE0
                          SHA-512:7A635F827EB876795FA16A6EF7379A8CFA50B788C967C249E4B75D0B6D065522EB2D734E7308880C7DBCEC3AE62D6276231C3DF35265E1587A4D7A8CE3681075
                          Malicious:false
                          Reputation:low
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xca2554d3,0x01d6d02f</date><accdate>0xca2554d3,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xca2554d3,0x01d6d02f</date><accdate>0xca27b70e,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):659
                          Entropy (8bit):5.12462335729784
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxc890A9mnWimI002EtM3MHdNMNxc890C9mnWimI00ObVEtMb:2d6NxeSZHKd6NxgSZ7Db
                          MD5:A4093653D4D96A4EFB49E68541B6F72B
                          SHA1:4524BBCE55C1B0D81F597112A11F5C2321F5E66A
                          SHA-256:3B4EE4B5A2A2D1F4694F9E5847006DB42DB322896E280759A8F2056EE5FC1BB0
                          SHA-512:AA67F8DE7B0E4870EEBE55185634E87C2A13CCE8DE4425A39CD4025948033295D158BFEDE8531D5A2A095A809F0089601BAB265B7E6C6125F7C619C003F295E7
                          Malicious:false
                          Reputation:low
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xca22f249,0x01d6d02f</date><accdate>0xca22f249,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xca22f249,0x01d6d02f</date><accdate>0xca2554d3,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):653
                          Entropy (8bit):5.098691772738815
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxfne90C9mnWimI002EtM3MHdNMNxfne90C9mnWimI00Obe5EtMb:2d6NxzSZHKd6NxzSZ7ijb
                          MD5:2E1F965D9C9DA6F550AE61A7E3B5C7B0
                          SHA1:EF66B845260C447E09584E6EE192C59CF6732CBF
                          SHA-256:4757191E2C90FE2C50B944E77E6636B25D7E66D4C3FF0A047C0219CE2C20776E
                          SHA-512:69B6A217A323E208631B96A851765E216874E379FBA76E61AC413B4D4A41AC9B38FA9B89A13E2FA3EDE39A1EC5A674B7726CD802009F8DFA992335F0A243940E
                          Malicious:false
                          Reputation:low
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xca2554d3,0x01d6d02f</date><accdate>0xca2554d3,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xca2554d3,0x01d6d02f</date><accdate>0xca2554d3,0x01d6d02f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Temp\Cretaceous.less
                          Process:C:\Windows\System32\wscript.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):72
                          Entropy (8bit):5.0395905849804485
                          Encrypted:false
                          SSDEEP:3:oGUgOP7Y/trTjsON0+9R:oHgOzStTz08
                          MD5:38BDF376DC8FF06D763ABFB85F16E744
                          SHA1:B4418B82A595DBCF6D6C713ED14D7F191D1653D9
                          SHA-256:FD37C8E5F1BCD00A6A4F72CEC293F75684D4E2F894560C5589FEF0E9D656FC0B
                          SHA-512:954E53AC714B86CDA8B1C8C1DEFA24EFF6867C360D2F8B56FB327D7E7A9AB75F1B783DF4F8B114CD089FE6AF559FC8ACFD1745E980DADD5A7075DD955F4FCCC4
                          Malicious:false
                          Reputation:low
                          Preview: TxDpUconizJBongexGkjLftosnhgehrqrZQYawBNMETFNFKeDDQghoYVAUQAPDnnzyexsGMU
                          C:\Users\user\AppData\Local\Temp\Florentine.zip
                          Process:C:\Windows\System32\wscript.exe
                          File Type:Zip archive data, at least v2.0 to extract
                          Category:dropped
                          Size (bytes):127956
                          Entropy (8bit):7.997827518832247
                          Encrypted:true
                          SSDEEP:3072:YHb1d0e1DbXBIKRtovyeU73MZJnz6NyJEenOgxL9lgxw0:2phvxIMMU73MZJnz6NyJEenhDgK0
                          MD5:41E4EF92CD8B45BB5B2BBD4BCAE98600
                          SHA1:1F5E90A9859F55B1481FE2CEC5B49436E7A612E4
                          SHA-256:5E4EEBD9A3DF23A450F744DC9B409DC4E4D082913215395053A0B64548DD6152
                          SHA-512:1955632A7CEB64B982B2314C3582CCB0A01B86C0E80982900C6CEAFB42B7CE32DD11B6288C1A71DB56CA98FB3D3ED057712FF4A067497AC6A2E5C78C21EA5B93
                          Malicious:true
                          Reputation:low
                          Preview: PK...........Q...[...........magnesia.xcodeproj..|T..0|7{..M.".......6...%..l....1."..).j.p/.#.......}.j.m.h...V........R.h1...F..)...B.{....`............33gf.9s..3w]wm.....pi.....?..O..8.u.[...._..T.......sm.C.V..`.w...w..2...*....}7.`qi.......,...?];..m...V...._..M......,L.......=.".e...Y...A.............s.}..b=.&...Wl......G.:...G....q.7.G..b...2.wx.7.D.\...s.F3$;.L..}F....8n5C.....].......zK....+Z....3.s...o..yD..[.t....p.h...V.-..q.W.m_...apP.......4.^....|.2.....U}..Y[..\.<.^...{.x..O..i...g.ep......+#=.=8.=-.........[.:.[.}.p...+;...w.;.{..l%.C...2..o.?...c4q..;.T.$..J01;e.......?...t......`.;M............Mu...C..Y.....}C.v...'1[......../.;a.....Xm*..l.'L...4s....5...;.....N|..~..h.SP..r.kP.@..).6lo.QG...C...|......m.]{..L*O.....2..............y....%L.|./..[B.Z.._..0..?;8..#...?.C~H}.=R~....L0L.d...V+..v..j.Uv...yh.~..:..FD.F.C....y..:.:uCw`...xB.r...bMH..r..=Y+..-at..vh.^4k.N.zl_..1.d.C...dk4...r..;....<...T...4&f.........n
                          C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
                          Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):89
                          Entropy (8bit):4.42357097083791
                          Encrypted:false
                          SSDEEP:3:oVXVPW2V8i8JOGXnFPW2V8gn:o9c2V8iqs2V8g
                          MD5:E92D610270954139E1F3C323DA3196FD
                          SHA1:D93870FA6338B39F80F7EE20F8C2E6F04A71D597
                          SHA-256:8D8FA2C1C8D83F8708A6343A501F88E9C0E2E5C440615C6BBE94009B9FC51DDF
                          SHA-512:2D521135B68EDA2F1C60A221DA99E1DC85DF32CF331181CA365B05C881CEB578F08EFD00B601EBBC0BDBB13FDAFDD8A9D927A061CC0B2A232D9F9E4BF478E606
                          Malicious:false
                          Preview: [2020/12/11 18:37:20.468] Latest deploy version: ..[2020/12/11 18:37:20.468] 11.211.2 ..
                          C:\Users\user\AppData\Local\Temp\adobe.url
                          Process:C:\Windows\System32\wscript.exe
                          File Type:MS Windows 95 Internet shortcut text (URL=<https://adobe.com/>), ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):108
                          Entropy (8bit):4.699454908123665
                          Encrypted:false
                          SSDEEP:3:J25YdimVVG/VClAWPUyxAbABGQEZapfpgtovn:J254vVG/4xPpuFJQxHvn
                          MD5:99D9EE4F5137B94435D9BF49726E3D7B
                          SHA1:4AE65CB58C311B5D5D963334F1C30B0BD84AFC03
                          SHA-256:F5BC6CF90B739E9C70B6EA13F5445B270D8F5906E199270E22A2F685D989211E
                          SHA-512:7B8A65FE6574A80E26E4D7767610596FEEA1B5225C3E8C7E105C6AC83F5312399EDB4E3798C3AF4151BCA8EF84E3D07D1ED1C5440C8B66B2B8041408F0F2E4F0
                          Malicious:false
                          Preview: [{000214A0-0000-0000-C000-000000000046}]..Prop3=19,11..[InternetShortcut]..IDList=..URL=https://adobe.com/..
                          C:\Users\user\AppData\Local\Temp\attrition.rst
                          Process:C:\Windows\System32\wscript.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):63
                          Entropy (8bit):4.7869034400127575
                          Encrypted:false
                          SSDEEP:3:VIgZtEzJsLdEsD2MWK4n:VBZtEd+deB
                          MD5:CC6F3311E5E879D311B5A5E112CDD672
                          SHA1:89BC5E8A21265FC0630F22F054E6CC5A19E1BBF2
                          SHA-256:6468EB6A24CA6A63F57A833409BD5D1596DFCC9D63FD7A9B5A145A61209891E4
                          SHA-512:0858444E31E20E2B32C570F38D794CF57B254A5FBC0218B55B35B4961AD2E27841E7423EB1361EEA83D9ABFC4372264120E2F74D3C1F984F700D3EB56561DF73
                          Malicious:false
                          Preview: GCJyPNEEObxmrPQvFfuOpgPjfIrxZrxsvZDigIKRcxgWgKFfKJuytTIxyayDyWN
                          C:\Users\user\AppData\Local\Temp\excitation.nsv
                          Process:C:\Windows\System32\wscript.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):46
                          Entropy (8bit):5.159325271227369
                          Encrypted:false
                          SSDEEP:3:30kx8WI/ugKUw9xS:3bVGMe
                          MD5:08584E25EA1162A8467D6BFEF331815C
                          SHA1:E31BD215D6804973362CE94F83BB6C47C1A3ED73
                          SHA-256:9EF49F09170200FD8F62F1FCF0E91D94D20A191B1FF9552F872D2D53BCB0B6BA
                          SHA-512:5FE863707F9B697639E10764C43B2C09A27F079646D94387466E3692BB4098EF36DA879F913499D2EC57546B2032A3A35E4E9F2D1CA3825B0A6EEC809D22BD49
                          Malicious:false
                          Preview: AWGgmNdczynnihwzmukIxCGYsjFfRKEobLJGHUqJVxQZTw
                          C:\Users\user\AppData\Local\Temp\magnesia.xcodeproj
                          Process:C:\Windows\System32\wscript.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):190976
                          Entropy (8bit):6.750819024692215
                          Encrypted:false
                          SSDEEP:3072:euVBf1aH8ZXCq5TF5Zj6C8Z+hVNtc9zIlQhQqQUQOQxZCH27JOW:ZdaH8Zj5J5ZN8Zksd+7
                          MD5:AB221BA951C5ACCC471713110F36D8EA
                          SHA1:3A897A9205AF7D3DF4280D988D146523B248B1B4
                          SHA-256:CEA0B6B83210A878E1BCC0C792658CA341911E8C43FDE86524501D265C8BAE16
                          SHA-512:1D7FB64F0979D77363E9D441BA785CA50CF59D2BFBCC65A16C1856E8F649E07420311CAE58A6BD267C09125271856BFF4AC3BF397B4497285D614EE18FB136A9
                          Malicious:true
                          Antivirus:
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: Metadefender, Detection: 22%, Browse
                          • Antivirus: ReversingLabs, Detection: 32%
                          Joe Sandbox View:
                          • Filename: 5Dk2HB4IS3dn.vbs, Detection: malicious, Browse
                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<.p&x..ux..ux..u_9su{..uf..u~..u..uy..uf..uw..uf..uv..uf..up..u_9eu...ux..u8..uf..u...uf..uy..uf..uy..uf..uy..uRichx..u........PE..L.....L...........!.....@...........3.......P.... .................................p|....@....................................d....P..K....................`..4....Q.................................@............P...............................text....>.......@.................. ..`.rdata...^...P...`...D..............@..@.data............&..................@....rsrc...K....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................................................
                          C:\Users\user\AppData\Local\Temp\~DF886CDEE6E19D09C0.TMP
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):40201
                          Entropy (8bit):0.6804375069862053
                          Encrypted:false
                          SSDEEP:192:kBqoxKAuqR+nonunkn1nenrBpSmCIsBpSmCIvBpSmCIg:kBqoxKAuqR+nonunkn1nenrBcnBcABct
                          MD5:53123C5E11307C1CE99FFB5D2FA41FFE
                          SHA1:4AB3F4513A0E7A14A2ED6B138F9F87A70E2FD9B8
                          SHA-256:56B8322E81818F04D8C3DFEACB5568E9E8F796C9C83C7860D0FEEE79473F500A
                          SHA-512:6F81F418B3F05997A6AC56E8574F6E1EB9EF95F549DCDA353AB1CB0ACCA4FAD8A48B42050017A046434BE2F2968D0314F0D2BAB038F472F66BB032809D4FC67B
                          Malicious:false
                          Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          C:\Users\user\AppData\Local\Temp\~DFE07CE41C772562F5.TMP
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):12933
                          Entropy (8bit):0.41251545920584415
                          Encrypted:false
                          SSDEEP:24:c9lLh9lLh9lIn9lIn9lomF9loK9lWo+eU+bk:kBqoIFzPebbk
                          MD5:4DA453BEBF66ACB5201E785E4DA53334
                          SHA1:5FC4408BD05F07007411844173D933B13A6ACEC2
                          SHA-256:D8FAA8228F99D4A9B8A50E0B6573857D6C20D52B50222ED318F2417826BF3EAF
                          SHA-512:EF8005C81E9B8888D830A946ED3902220D6125EA3AA009C07E7F3A954B2F318143C1F29D2CC0846B0BB3C03225C59400724267AA2A29916E36BB4198E5C0F8C9
                          Malicious:false
                          Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                          Static File Info

                          General

                          File type:ASCII text, with very long lines, with CRLF, LF line terminators
                          Entropy (8bit):4.844330860646302
                          TrID:
                            File name:0HsPbXmcFf1k.vbs
                            File size:720743
                            MD5:b75cacca388f6233844e2720bc52a9cd
                            SHA1:de080d98e0f092175d71f15d78ca92e1665edb53
                            SHA256:a5b2a02293e8875977dc822c8b1ca4101c2e378463018a5b6a572be559e3abb4
                            SHA512:abdb82e60f3944797e50c052b19332d73e9da04b735566d8c1008398dd3bbfe8bb761f00910be1e914e1c705c43dd3c19d6a7ece7243136ac5074898725bfb9b
                            SSDEEP:12288:fdDKhxQYERqmP2eWlivERsxOHqn82C+Bx/Ox4Ot0vKRam/AdqsZYRWyv53NpOs0P:fZKhxQYEkmPR9v+swHq82tBx/Ox4Ot0p
                            File Content Preview:const o444 = 831..REM grandnephew cockfight skid sawtooth prophetic glib Monica dirty stocky Rica Ito pewter pervade cascara, scramble mist Parsifal compete correspondent soft admission politic. foam Loeb barony impress synergistic faience noose Selwyn ai

                            File Icon

                            Icon Hash:e8d69ece869a9ec4

                            Network Behavior

                            Network Port Distribution

                            TCP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            Dec 11, 2020 18:37:21.854671001 CET4973780192.168.2.347.241.19.44
                            Dec 11, 2020 18:37:21.854995012 CET4973880192.168.2.347.241.19.44
                            Dec 11, 2020 18:37:22.129750013 CET804973847.241.19.44192.168.2.3
                            Dec 11, 2020 18:37:22.129925966 CET4973880192.168.2.347.241.19.44
                            Dec 11, 2020 18:37:22.130712032 CET804973747.241.19.44192.168.2.3
                            Dec 11, 2020 18:37:22.130793095 CET4973780192.168.2.347.241.19.44
                            Dec 11, 2020 18:37:22.131700993 CET4973880192.168.2.347.241.19.44
                            Dec 11, 2020 18:37:22.449752092 CET804973847.241.19.44192.168.2.3
                            Dec 11, 2020 18:37:22.945019960 CET804973847.241.19.44192.168.2.3
                            Dec 11, 2020 18:37:22.947027922 CET4973880192.168.2.347.241.19.44
                            Dec 11, 2020 18:37:22.950531006 CET4973880192.168.2.347.241.19.44
                            Dec 11, 2020 18:37:23.215575933 CET4973780192.168.2.347.241.19.44
                            Dec 11, 2020 18:37:23.225663900 CET804973847.241.19.44192.168.2.3
                            Dec 11, 2020 18:37:23.533277035 CET804973747.241.19.44192.168.2.3
                            Dec 11, 2020 18:37:24.022460938 CET804973747.241.19.44192.168.2.3
                            Dec 11, 2020 18:37:24.022689104 CET4973780192.168.2.347.241.19.44
                            Dec 11, 2020 18:37:24.024178982 CET4973780192.168.2.347.241.19.44
                            Dec 11, 2020 18:37:24.300183058 CET804973747.241.19.44192.168.2.3

                            UDP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            Dec 11, 2020 18:35:26.885963917 CET6083153192.168.2.38.8.8.8
                            Dec 11, 2020 18:35:26.918586969 CET53608318.8.8.8192.168.2.3
                            Dec 11, 2020 18:35:27.587764978 CET6010053192.168.2.38.8.8.8
                            Dec 11, 2020 18:35:27.614926100 CET53601008.8.8.8192.168.2.3
                            Dec 11, 2020 18:35:28.574943066 CET5319553192.168.2.38.8.8.8
                            Dec 11, 2020 18:35:28.599185944 CET53531958.8.8.8192.168.2.3
                            Dec 11, 2020 18:35:29.421298981 CET5014153192.168.2.38.8.8.8
                            Dec 11, 2020 18:35:29.455979109 CET53501418.8.8.8192.168.2.3
                            Dec 11, 2020 18:35:30.426198959 CET5302353192.168.2.38.8.8.8
                            Dec 11, 2020 18:35:30.453500032 CET53530238.8.8.8192.168.2.3
                            Dec 11, 2020 18:35:31.624501944 CET4956353192.168.2.38.8.8.8
                            Dec 11, 2020 18:35:31.657430887 CET53495638.8.8.8192.168.2.3
                            Dec 11, 2020 18:35:32.289840937 CET5135253192.168.2.38.8.8.8
                            Dec 11, 2020 18:35:32.316992044 CET53513528.8.8.8192.168.2.3
                            Dec 11, 2020 18:35:32.936233997 CET5934953192.168.2.38.8.8.8
                            Dec 11, 2020 18:35:32.960423946 CET53593498.8.8.8192.168.2.3
                            Dec 11, 2020 18:35:33.963471889 CET5708453192.168.2.38.8.8.8
                            Dec 11, 2020 18:35:33.990894079 CET53570848.8.8.8192.168.2.3
                            Dec 11, 2020 18:35:34.975903034 CET5882353192.168.2.38.8.8.8
                            Dec 11, 2020 18:35:35.000291109 CET53588238.8.8.8192.168.2.3
                            Dec 11, 2020 18:35:36.038522959 CET5756853192.168.2.38.8.8.8
                            Dec 11, 2020 18:35:36.065653086 CET53575688.8.8.8192.168.2.3
                            Dec 11, 2020 18:35:59.895826101 CET5054053192.168.2.38.8.8.8
                            Dec 11, 2020 18:35:59.930154085 CET53505408.8.8.8192.168.2.3
                            Dec 11, 2020 18:36:07.340456963 CET5436653192.168.2.38.8.8.8
                            Dec 11, 2020 18:36:07.367525101 CET53543668.8.8.8192.168.2.3
                            Dec 11, 2020 18:36:44.198108912 CET5303453192.168.2.38.8.8.8
                            Dec 11, 2020 18:36:44.227102041 CET53530348.8.8.8192.168.2.3
                            Dec 11, 2020 18:36:44.749133110 CET5776253192.168.2.38.8.8.8
                            Dec 11, 2020 18:36:44.773436069 CET53577628.8.8.8192.168.2.3
                            Dec 11, 2020 18:36:49.624397039 CET5543553192.168.2.38.8.8.8
                            Dec 11, 2020 18:36:49.658447027 CET53554358.8.8.8192.168.2.3
                            Dec 11, 2020 18:37:19.500560045 CET5071353192.168.2.38.8.8.8
                            Dec 11, 2020 18:37:19.524730921 CET53507138.8.8.8192.168.2.3
                            Dec 11, 2020 18:37:19.970143080 CET5613253192.168.2.38.8.8.8
                            Dec 11, 2020 18:37:20.007044077 CET53561328.8.8.8192.168.2.3
                            Dec 11, 2020 18:37:21.265312910 CET5898753192.168.2.38.8.8.8
                            Dec 11, 2020 18:37:21.289767981 CET53589878.8.8.8192.168.2.3
                            Dec 11, 2020 18:37:21.498341084 CET5657953192.168.2.38.8.8.8
                            Dec 11, 2020 18:37:21.821718931 CET53565798.8.8.8192.168.2.3
                            Dec 11, 2020 18:37:33.984776974 CET6063353192.168.2.38.8.8.8
                            Dec 11, 2020 18:37:34.025861979 CET53606338.8.8.8192.168.2.3
                            Dec 11, 2020 18:37:34.913228035 CET6129253192.168.2.38.8.8.8
                            Dec 11, 2020 18:37:34.947140932 CET53612928.8.8.8192.168.2.3
                            Dec 11, 2020 18:37:49.980737925 CET6361953192.168.2.38.8.8.8
                            Dec 11, 2020 18:37:50.007965088 CET53636198.8.8.8192.168.2.3
                            Dec 11, 2020 18:37:50.975408077 CET6361953192.168.2.38.8.8.8
                            Dec 11, 2020 18:37:51.002464056 CET53636198.8.8.8192.168.2.3
                            Dec 11, 2020 18:37:51.993993998 CET6361953192.168.2.38.8.8.8
                            Dec 11, 2020 18:37:52.021075964 CET53636198.8.8.8192.168.2.3
                            Dec 11, 2020 18:37:54.006474972 CET6361953192.168.2.38.8.8.8
                            Dec 11, 2020 18:37:54.033734083 CET53636198.8.8.8192.168.2.3
                            Dec 11, 2020 18:37:58.021959066 CET6361953192.168.2.38.8.8.8
                            Dec 11, 2020 18:37:58.049098969 CET53636198.8.8.8192.168.2.3

                            DNS Queries

                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                            Dec 11, 2020 18:37:21.498341084 CET192.168.2.38.8.8.80xb2caStandard query (0)api10.laptok.atA (IP address)IN (0x0001)

                            DNS Answers

                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                            Dec 11, 2020 18:36:44.227102041 CET8.8.8.8192.168.2.30x1d56No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                            Dec 11, 2020 18:37:21.821718931 CET8.8.8.8192.168.2.30xb2caNo error (0)api10.laptok.at47.241.19.44A (IP address)IN (0x0001)

                            HTTP Request Dependency Graph

                            • api10.laptok.at

                            HTTP Packets

                            Session IDSource IPSource PortDestination IPDestination PortProcess
                            0192.168.2.34973847.241.19.4480C:\Program Files (x86)\Internet Explorer\iexplore.exe
                            TimestampkBytes transferredDirectionData
                            Dec 11, 2020 18:37:22.131700993 CET4749OUTGET /api1/up8ONzjM/NUlpC0iTl8QPTXkOW4B0HW_/2BJhTzjeJq/8OY5q_2FvwI2aBOZa/blCNrgbOTsXG/HhSGjlZAz75/MGS0M3hXIYptAx/t_2BV8CyK5tAOx9S5ETcL/RfswvYGcruz09Ttu/liLSJkBAsVxHqgz/lU4z93taaS3OdirxC8/XaU5JN3Fl/kDBJId8zKh02ccx1lAnJ/hYXmd9L_2FBIPWbwnnA/RUKF8siFTAyjQU0l65PXXn/uAbc5e9Igb03_/2Bph4va6/5CKxcM_0A_0DG5URWLIjFfc/_2BGXTJPcZ/281nTqW9aBaFUw_2F/4c_2FBISILQC/Ywr7kYPa7W2/Rgd_2BAEKFtO/GAw HTTP/1.1
                            Accept: text/html, application/xhtml+xml, image/jxr, */*
                            Accept-Language: en-US
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                            Accept-Encoding: gzip, deflate
                            Host: api10.laptok.at
                            Connection: Keep-Alive
                            Dec 11, 2020 18:37:22.945019960 CET4750INHTTP/1.1 200 OK
                            Server: nginx
                            Date: Fri, 11 Dec 2020 17:37:22 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: close
                            Vary: Accept-Encoding
                            Strict-Transport-Security: max-age=63072000; includeSubdomains
                            X-Content-Type-Options: nosniff
                            Content-Encoding: gzip
                            Data Raw: 31 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 03 00 00 00 00 00 00 00 00 00 0d 0a 30 0d 0a 0d 0a
                            Data Ascii: 140


                            Session IDSource IPSource PortDestination IPDestination PortProcess
                            1192.168.2.34973747.241.19.4480C:\Program Files (x86)\Internet Explorer\iexplore.exe
                            TimestampkBytes transferredDirectionData
                            Dec 11, 2020 18:37:23.215575933 CET4750OUTGET /favicon.ico HTTP/1.1
                            Accept: */*
                            Accept-Encoding: gzip, deflate
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                            Host: api10.laptok.at
                            Connection: Keep-Alive
                            Dec 11, 2020 18:37:24.022460938 CET4751INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Fri, 11 Dec 2020 17:37:23 GMT
                            Content-Type: text/html; charset=utf-8
                            Transfer-Encoding: chunked
                            Connection: close
                            Vary: Accept-Encoding
                            Content-Encoding: gzip
                            Data Raw: 36 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 40 11 1b 7d a8 34 c8 6c a0 22 28 2f 2f 3d 33 af 02 59 4e 1f 66 9a 3e d4 25 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a
                            Data Ascii: 6a(HML),I310Q/Qp/K&T";Ct@}4l"(//=3YNf>%a30


                            Code Manipulations

                            Statistics

                            Behavior

                            Click to jump to process

                            System Behavior

                            General

                            Start time:18:35:31
                            Start date:11/12/2020
                            Path:C:\Windows\System32\wscript.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\0HsPbXmcFf1k.vbs'
                            Imagebase:0x7ff603ab0000
                            File size:163840 bytes
                            MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:18:37:18
                            Start date:11/12/2020
                            Path:C:\Program Files\internet explorer\iexplore.exe
                            Wow64 process (32bit):false
                            Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                            Imagebase:0x7ff7ed280000
                            File size:823560 bytes
                            MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:18:37:19
                            Start date:11/12/2020
                            Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1948 CREDAT:17410 /prefetch:2
                            Imagebase:0x13b0000
                            File size:822536 bytes
                            MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Disassembly

                            Code Analysis

                            Reset < >