=
We are hiring! Windows Kernel Developer (Remote), apply here!
flash

tregrene-KaufVertraeg-JoachimSvensson-23564334.vbs

Status: finished
Submission Time: 2022-01-26 14:57:16 +01:00
Malicious
Trojan
Evader
Remcos GuLoader

Comments

Tags

Details

  • Analysis ID:
    560422
  • API (Web) ID:
    927948
  • Analysis Started:
    2022-01-26 15:00:13 +01:00
  • Analysis Finished:
    2022-01-26 15:31:33 +01:00
  • MD5:
    b8fbb413a49b2f05872cb38372454664
  • SHA1:
    2071d3476c94b3cfc924b31c705806e78df674a8
  • SHA256:
    cffa320db9834e3f224aa5961073fc9d0cb14f34c6430ffa2d7468da7da7ce32
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
84/100

System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
Run Condition: Suspected Instruction Hammering

malicious
100/100

IPs

IP Country Detection
94.130.249.123
Germany
162.159.133.233
United States

Domains

Name IP Detection
cdn.discordapp.com
162.159.133.233

URLs

Name Detection
i;j49.123
https://aka.ms/pscore6lB6m
https://cdn.discordapp.com/attachments/933089029631639657/933089094899228722/4687_OIhOpvia11.bing
Click to see the 29 hidden entries
https://cdn.discordapp.com/k-?
http://nuget.org/NuGet.exe
https://cdn.discordapp.com/attachments/933089029631639657/933089094899228722/4687_OIhOpvia11.bin&
http://pesterbdd.com/images/Pester.png
http://www.apache.org/licenses/LICENSE-2.0.html
https://cdn.discordapp.com/attachments/933089029631639657/933089094899228722/4687_OIhOpvia11.bino
https://cdn.discordapp.com/p
https://contoso.com/License
https://contoso.com/Icon
https://github.com/Pester/Pester$
https://cdn.discordapp.com/
https://cdn.discordapp.com/attachments/933089029631639657/933089094899228722/4687_OIhOpvia11.binb
https://github.com/Pester/Pester
https://cdn.discordapp.com/attachments/933089228261294143/9
https://cdn.discordapp.com/c
https://cdn.discordapp.com/attachments/933089228261294143/933089306719961188/IMG_25254535627256.jpgS
https://cdn.discordapp.com/attachments/933089228261294143/933089306719961188/IMG_25254535627256.jpg
http://www.apache.org/licenses/LICENSE-2.0.html$
https://aka.ms/pscore6lBAm
https://contoso.com/
https://nuget.org/nuget.exe
http://pesterbdd.com/images/Pester.png$
https://cdn.discordapp.com/attachments/933089029631639657/933089094899228722/4687_OIhOpvia11.binn32
https://cdn.discordapp.com/attachments/933089029631639657/933089094899228722/4687_OIhOpvia11.bint
https://cdn.discordapp.com/attachments/933089029631639657/933089094899228722/4687_OIhOpvia11.bin
https://cdn.discordapp.com/attachments/933089029631639657/933089094899228722/4687_OIhOpvia11.bins
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://cdn.discordapp.com/attachments/933089029631639657/933089094899228722/4687_OIhOpvia11.binnmd
https://cdn.discordapp.com/1s

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\wxgbxjsa.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\wxgbxjsa.out
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CX7VR8NTK1JEZL7Z7HA8.temp
data
#
Click to see the 36 hidden entries
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LHBYS6CGLONKU62STSP4.temp
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
#
C:\Users\user\Documents\20220126\PowerShell_transcript.134349.9aadHJ3P.20220126151432.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#
C:\Users\user\Documents\20220126\PowerShell_transcript.134349.Ee+5Lwt6.20220126151517.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#
C:\Users\user\Documents\20220126\PowerShell_transcript.134349.PE71oyej.20220126151427.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20220126\PowerShell_transcript.134349.gQ3oRNES.20220126151422.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\Documents\20220126\PowerShell_transcript.134349.mrnfU7dc.20220126151307.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\CSC1F7F6E38280547C88EA9F93164256468.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\CSC8CEBFB2B5FB1400592E8D3F6A040AE46.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\CSCED2B87455DE24E4084C3BB361169C34B.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\IMG_25254535627256.jpg
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=1, orientation=upper-left], baseline, precision 8, 2381x1786, frames 3
#
C:\Users\user\AppData\Local\Temp\RES330D.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols
#
C:\Users\user\AppData\Local\Temp\RESB0A3.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x486, 9 symbols
#
C:\Users\user\AppData\Local\Temp\RESEA37.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0jx5505p.jkb.psm1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ddpbrm4.fch.psm1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ho4kuc44.kw0.psm1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hxpiysgi.bhw.ps1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jzrfl0di.yca.ps1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mvaqwnn4.2ae.ps1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qyijevp4.g2t.psm1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vhoxudov.lfr.psm1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w1cjsfyh.uqr.ps1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y2udcow1.gts.ps1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\ginqqgem.0.cs
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\ginqqgem.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\ginqqgem.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\ginqqgem.out
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\rf0jcwxf.0.cs
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\rf0jcwxf.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\rf0jcwxf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\rf0jcwxf.out
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
#
C:\Users\user\AppData\Local\Temp\wxgbxjsa.0.cs
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\wxgbxjsa.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#