top title background image
flash

PO-19903.vbs

Status: finished
Submission Time: 2022-05-12 13:23:05 +02:00
Malicious
Trojan
Evader
GuLoader

Comments

Tags

  • GuLoader
  • vbs

Details

  • Analysis ID:
    625175
  • API (Web) ID:
    992678
  • Analysis Started:
    2022-05-12 13:29:19 +02:00
  • Analysis Finished:
    2022-05-12 14:13:52 +02:00
  • MD5:
    0347b27843d88f73fdcd4dadb95549ac
  • SHA1:
    2a2d6bcd2d83833d501b9695921855e1992f6ec8
  • SHA256:
    1ab3aacaa62faa6a83173e9191972d427aab92f33c527f6964f141e21c930e67
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 84
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 100
System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
Run Condition: Suspected Instruction Hammering

Third Party Analysis Engines

malicious
Score: 5/92
malicious
Score: 8/41
malicious

IPs

IP Country Detection
197.210.226.45
Nigeria
148.66.138.165
Singapore
194.5.98.59
Netherlands
Click to see the 2 hidden entries
13.107.43.13
United States
197.210.226.89
Nigeria

Domains

Name IP Detection
toshiba1122.duckdns.org
194.5.98.59
vegproworld.com
148.66.138.165
toshiba1122.ddns.net
197.210.226.45
Click to see the 3 hidden entries
l-0004.l-dc-msedge.net
13.107.43.13
onedrive.live.com
0.0.0.0
jgdbpa.am.files.1drv.com
0.0.0.0

URLs

Name Detection
http://pesterbdd.com/images/Pester.png
https://vegproworld.com/wp-content/Touchb.vbs
https://vegproworld.com/:k
Click to see the 19 hidden entries
https://vegproworld.com/rj-$
https://onedrive.live.com/
http://nuget.org/NuGet.exe
https://jgdbpa.am.files.1drv.com/
https://github.com/Pester/Pester
https://onedrive.live.com/:
https://jgdbpa.am.files.1drv.com/y4mstf71DnOKqqDiI505gr5x-9GCiHWv5DdrHG7ALTidojrV4lxxrd7sQ3eLTcarbaq
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://onedrive.live.com/ndows
https://onedrive.live.com/download?cid=7EB674A88CCF381D&resid=7EB674A88CCF381D%21126&authkey=AKOI304
https://contoso.com/Icon
https://contoso.com/License
https://nuget.org/nuget.exe
https://contoso.com/
https://jgdbpa.am.files.1drv.com/y4maRwf2HHiC3pXkJNQF9GW7D5PTiYgoa5jSqqmo4o-s2nHza5cDyEK1j43pCU9Ua1Y
https://go.micro
https://onedrive.live.com/download?cid=7EB674A88CCF381D&resid=7EB674A88CCF381D%21126&authkey=AKOI304UDXKDuEA
http://www.apache.org/licenses/LICENSE-2.0.html
https://aka.ms/pscore6lB

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Temp\OVER.dat
data
#
C:\Users\user\AppData\Local\Temp\PTEROSTI.dat
data
#
Click to see the 9 hidden entries
C:\Users\user\AppData\Local\Temp\RES41DC.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols
#
C:\Users\user\AppData\Local\Temp\Touchb.vbs
ASCII text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m2c23kwp.iaa.ps1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zq1cbexs.zho.psm1
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\ppgnlr3u\CSC3E3BD6AE19504271A02C9239AA6C641F.TMP
MSVC .res
#
C:\Users\user\AppData\Local\Temp\ppgnlr3u\ppgnlr3u.0.cs
UTF-8 Unicode (with BOM) text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\ppgnlr3u\ppgnlr3u.cmdline
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
#
C:\Users\user\AppData\Local\Temp\ppgnlr3u\ppgnlr3u.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Temp\ppgnlr3u\ppgnlr3u.out
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
#