=
We are hiring! Windows Kernel Developer (Remote), apply here!
flash

New _Inquiry P.O4622.vbs

Status: finished
Submission Time: 2022-01-21 17:12:45 +01:00
Malicious
Trojan
Spyware
Evader
FormBook GuLoader

Comments

Tags

  • GuLoader
  • vbs

Details

  • Analysis ID:
    557838
  • API (Web) ID:
    925355
  • Analysis Started:
    2022-01-21 17:22:24 +01:00
  • Analysis Finished:
    2022-01-21 17:36:22 +01:00
  • MD5:
    24e935f7534a81a7fd4e32daeab208a5
  • SHA1:
    251ac05ebc8c963418dccddda127d2a81b5097db
  • SHA256:
    5e6d8684c3f71ca6a76d22d1ddc536f302738a3027d22a5b1ce1852c9c551d99
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
5/57

malicious
6/43

malicious

IPs

IP Country Detection
157.7.107.166
Japan

Domains

Name IP Detection
owanlab.com
157.7.107.166
www.ordemt.com
0.0.0.0

URLs

Name Detection
https://owanlab.com/bin_DziiNe252.binhttps://gsmservice.tech/bin_DziiNe252.bin
www.usyeslogistics.com/k6sm/
https://owanlab.com/bin_DziiNe252.bin
Click to see the 13 hidden entries
http://pesterbdd.com/images/Pester.png
http://www.apache.org/licenses/LICENSE-2.0.html
https://contoso.com/
https://nuget.org/nuget.exe
https://contoso.com/License
https://contoso.com/Icon
http://www.apache.org/licenses/LICENSE-2.0.html0~
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://github.com/Pester/Pester
http://nuget.org/NuGet.exe
http://pesterbdd.com/images/Pester.png0~
https://gsmservice.tech/bin_DziiNe252.bin
https://github.com/Pester/Pester0~

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\LQM-8D39\LQMlogri.ini
data
#
C:\Users\user\AppData\Roaming\LQM-8D39\LQMlogrv.ini
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
Click to see the 13 hidden entries
C:\Users\user\AppData\Local\Temp\DB1
SQLite 3.x database, last written using SQLite version 3032001
#
C:\Users\user\AppData\Local\Temp\RES6913.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4vmckcl5.kyp.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rzqlzjeu.xur.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\blueb.dat
data
#
C:\Users\user\AppData\Local\Temp\vsdke30k\CSC2B92EBAA3FFD4AC6819286896BCEF79.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\vsdke30k\vsdke30k.0.cs
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\vsdke30k\vsdke30k.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\vsdke30k\vsdke30k.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\vsdke30k\vsdke30k.out
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
#
C:\Users\user\AppData\Roaming\LQM-8D39\LQMlogim.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
#
C:\Users\user\AppData\Roaming\LQM-8D39\LQMlogrg.ini
data
#
C:\Users\user\Documents\20220121\PowerShell_transcript.376483.GlXAcc5B.20220121172432.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#