File name:

Trojan.VBS.Bolbi.v2.vbs

Full analysis: https://app.any.run/tasks/8262a060-e4c9-48f6-b43f-cb369e772058
Verdict: Malicious activity
Analysis date: August 08, 2019, 12:13:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with CRLF line terminators
MD5:

584F03161A17B36B2F5163DD85BC0B77

SHA1:

04DAD07D0146FF09C0DACC3F248DBDA16055A609

SHA256:

EE2A2B418E82683DE196BEB5D4F6CB213E7579D783B06B9949F4A988F515B324

SSDEEP:

24576:gjSdueeKiZeXA940z802o5mNBriKgcdgUixQsUgk:gjSduKCeA2oqdJqfk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • wscript.exe (PID: 2664)
  • SUSPICIOUS

    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 3408)
    • Application launched itself

      • WScript.exe (PID: 2984)
    • Executed via COM

      • OUTLOOK.EXE (PID: 3408)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 3408)
    • Removes files from Windows directory

      • OUTLOOK.EXE (PID: 3408)
    • Creates files in the Windows directory

      • OUTLOOK.EXE (PID: 3408)
    • Executable content was dropped or overwritten

      • wscript.exe (PID: 2664)
    • Changes the desktop background image

      • wscript.exe (PID: 2664)
    • Executes scripts

      • WScript.exe (PID: 2984)
  • INFO

    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 3408)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe no specs wscript.exe outlook.exe

Process information

PID
CMD
Path
Indicators
Parent process
2664"C:\Windows\System32\wscript.exe" "C:\Users\admin\AppData\Local\Temp\Trojan.VBS.Bolbi.v2.vbs" /elevatedC:\Windows\System32\wscript.exe
WScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2984"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Trojan.VBS.Bolbi.v2.vbs"C:\Windows\System32\WScript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3408"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Outlook
Exit code:
0
Version:
14.0.6025.1000
Modules
Images
c:\progra~1\micros~1\office14\outlook.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
1 472
Read events
1 359
Write events
101
Delete events
12

Modification events

(PID) Process:(2984) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2984) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2664) wscript.exeKey:HKEY_CURRENT_USER\Control Panel\Desktop
Operation:writeName:Wallpaper
Value:
C:\Users\Public\ghostroot\god.bmp
(PID) Process:(2664) wscript.exeKey:HKEY_CURRENT_USER\Control Panel\Desktop
Operation:writeName:OriginalWallpaper
Value:
C:\Users\Public\ghostroot\god.bmp
(PID) Process:(2664) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:Wallpaper
Value:
C:\Users\Public\ghostroot\god.bmp
(PID) Process:(2664) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:WallpaperStyle
Value:
2
(PID) Process:(2664) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Bolbi
Value:
C:\Users\Public\Ghostroot\Just For You.jpg.vbs
(PID) Process:(2664) wscript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Bolbi
Value:
C:\Users\Public\Ghostroot\Just For You.jpg.vbs
(PID) Process:(2664) wscript.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot
Operation:writeName:AlternateShell
Value:
notepad.exe
(PID) Process:(2664) wscript.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ActiveComputerName
Operation:writeName:ComputerName
Value:
Bolbi
Executable files
1
Suspicious files
3
Text files
31
Unknown types
1

Dropped files

PID
Process
Filename
Type
3408OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRAB38.tmp.cvr
MD5:
SHA256:
3408OUTLOOK.EXEC:\Windows\system32\PerfStringBackup.TMP
MD5:
SHA256:
3408OUTLOOK.EXEC:\Windows\system32\PerfStringBackup.INIbinary
MD5:
SHA256:
3408OUTLOOK.EXEC:\Windows\system32\perfc009.datbinary
MD5:
SHA256:
3408OUTLOOK.EXEC:\Windows\system32\perfh009.datbinary
MD5:
SHA256:
2664wscript.exeC:\Users\Public\ghostroot\Just for you.jpg.vbstext
MD5:584F03161A17B36B2F5163DD85BC0B77
SHA256:EE2A2B418E82683DE196BEB5D4F6CB213E7579D783B06B9949F4A988F515B324
3408OUTLOOK.EXEC:\Windows\inf\Outlook\outlperf.htext
MD5:BC71FF7DA14ECA943FA0AD815F72B8CB
SHA256:48E537902C03A3EEE4790FC97EE072CDDC7C1A90122702DD18243D8C12A0D99A
2664wscript.exeC:\Users\Public\ghostroot\rpdbfk.exeexecutable
MD5:C26ED4EA9E70F65399AAD2447E4AAFB4
SHA256:FBA6DF310468661DAAB22C696D2B112EC8441857AD4BBF9AB63673260E2C5740
2664wscript.exeC:\Users\Public\ghostroot\SOUNDS FROM HELL RECORDING TOTALLY LEGIT.mp3mp3
MD5:41C89EEBB86E4F4B1B0033D8E0214026
SHA256:9DD0D4B5D11A686F9320A306D78B37404A5397E2E0D79628363DB348AE9B1C48
3408OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_AvailabilityOptions_2_66F4E76602DA9D429D81A5F9DE3443C5.datxml
MD5:EEAA832C12F20DE6AAAA9C7B77626E72
SHA256:C4C9A90F2C961D9EE79CF08FBEE647ED7DE0202288E876C7BAAD00F4CA29CA16
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3408
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3408
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted

Threats

No threats detected
No debug info