top title background image
flash

3G1J49A6V_Invoice.vbs

Status: finished
Submission Time: 2021-08-03 20:38:20 +02:00
Malicious
Trojan
Evader
Nanocore Njrat

Comments

Tags

  • vbs

Details

  • Analysis ID:
    458883
  • API (Web) ID:
    826452
  • Analysis Started:
    2021-08-03 20:38:20 +02:00
  • Analysis Finished:
    2021-08-03 20:51:18 +02:00
  • MD5:
    2da417ae523148f7d65220a2c44d1a0a
  • SHA1:
    7173fc941d4c051cf4bf5b1eac46aa33f2e6b798
  • SHA256:
    c3ddf55e53888193522a7b619370b746cb0a79502c5157a98754a9009f644a11
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
185.244.30.23
Netherlands
207.241.227.125
United States
207.241.228.148
United States

Domains

Name IP Detection
dangomra.duckdns.org
185.244.30.23
newjan.duckdns.org
185.244.30.23
ia601405.us.archive.org
207.241.227.125
Click to see the 1 hidden entries
ia801408.us.archive.org
207.241.228.148

URLs

Name Detection
https://gro.sndkcud.armognad
newjan.duckdns.org
http://crl.godaddy.com/gdroot-g2.crl0F
Click to see the 9 hidden entries
https://ia601405.us.archive.org/30/items/all_20210803_20210803/ALL.txt
http://certificates.godaddy.repo
https://certs.godaddy.com/repository/0
http://certificates.godaddy.
https://ia801408.us.archive.org/20/items/server_202108/Server.txt
http://google.com
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://go.micro
http://certs.godaddy.com/repository/1301

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
data
#
C:\Users\user\Documents\20210803\PowerShell_transcript.301389.iaYgJ3Zj.20210803203913.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#
C:\Users\Public\Run\Run.vbs
ASCII text, with CRLF line terminators
#
Click to see the 8 hidden entries
C:\Users\Public\Run\Windows.lnk
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_crtkfx14.gxu.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dcg2nrvy.g5h.ps1
very short file (no magic)
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
data
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
data
#
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Windows.lnk
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
#