=
flash

MTIR22024323_0553381487_20220112120005.vbs

Status: finished
Submission Time: 13.01.2022 14:40:34
Malicious
Trojan
Spyware
Evader
FormBook GuLoader

Comments

Tags

  • vbs

Details

  • Analysis ID:
    552589
  • API (Web) ID:
    920106
  • Analysis Started:
    13.01.2022 14:52:48
  • Analysis Finished:
    13.01.2022 15:09:44
  • MD5:
    564601676bee71f5f61a44ef170d92a6
  • SHA1:
    76fca984dab2358e66524172e04a3528f33d8e18
  • SHA256:
    5e12314df61fd39cad151a41fb0d3188e437c591fa7498f09f103dea4a46f141
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
5/41

IPs

IP Country Detection
52.68.15.223
United States

Domains

Name IP Detection
www.jewelrystore1.com
154.208.173.143
www.wizumiya.co.jp
52.68.15.223

URLs

Name Detection
www.jewelrystore1.com/wk3t/
https://www.wizumiya.co.jp/html/user_da
http://www.autoitscript.com/autoit3/J
Click to see the 15 hidden entries
http://nuget.org/NuGet.exe
http://pesterbdd.com/images/Pester.png
https://www.wizumiya.co.jp/html/user_data/original/images/bin_WUOAiR166.binhttp://fahrschule-heli.at
http://crl.microsoft
http://www.apache.org/licenses/LICENSE-2.0.html
https://contoso.com/
https://nuget.org/nuget.exe
https://contoso.com/License
https://contoso.com/Icon
http://schemas.microsoft.
http://fahrschule-heli.at/bin_WUOAiR166.bin
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;g
https://www.wizumiya.co.jp/html/user_data/original/images/bin_WUOAiR166.bin
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://github.com/Pester/Pester

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\DB1
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Roaming\O118090C\O11logri.ini
data
#
C:\Users\user\AppData\Roaming\O118090C\O11logrv.ini
data
#
Click to see the 14 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Temp\FORSVARL.dat
data
#
C:\Users\user\AppData\Local\Temp\RES5835.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ti3icgl.ztk.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v10kgrqs.2gg.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\ej2xf2fu\CSC2BA07324D1EB47AD834E18C884AF81E4.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\ej2xf2fu\ej2xf2fu.0.cs
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\ej2xf2fu\ej2xf2fu.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\ej2xf2fu\ej2xf2fu.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\ej2xf2fu\ej2xf2fu.out
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
#
C:\Users\user\AppData\Roaming\O118090C\O11logim.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
#
C:\Users\user\AppData\Roaming\O118090C\O11logrg.ini
data
#
C:\Users\user\Documents\20220113\PowerShell_transcript.675052.bBuy1HxC.20220113145401.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#