Analysis

  • max time kernel
    89s
  • max time network
    86s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    28-01-2022 21:38

General

  • Target

    348e3fd080c8002b826be2577ffa3bc64f263aa779c9f8ff88e4642c294c4381.vbs

  • Size

    13KB

  • MD5

    4aed0075ccb90c72dfd7b6ae3edc2d62

  • SHA1

    9946084ede7c2017b98ffae193513a5b4fca4b9d

  • SHA256

    348e3fd080c8002b826be2577ffa3bc64f263aa779c9f8ff88e4642c294c4381

  • SHA512

    26a5b91fc1b0d2914f50c478240cc79391ba33c299e77f2cf7c9eac7d8dcae3ce6cca7ea474cb91050942ab207acbfb74180419952ebf23a2aef9416e2303967

Score
10/10

Malware Config

Signatures

  • Lampion

    Lampion is a banking trojan, targeting Portuguese speaking countries.

  • Blocklisted process makes network request 8 IoCs
  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\348e3fd080c8002b826be2577ffa3bc64f263aa779c9f8ff88e4642c294c4381.vbs"
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Windows\System32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Roaming\ajswjnecxhr.vbs
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      PID:984
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1156
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:772

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\89477238595485\lreiuppwajewaqwhk76472905993461.exe

        MD5

        3d7fd320a94aeb96da9945d637a8bdf7

        SHA1

        dadc6e8cb4a5846c42c8571e0a0e5dddcef9a224

        SHA256

        681e3343cfa25cf2f47fc94ce8750a699b9d8316af44dfee875bd58e79c30683

        SHA512

        bfe9fe78f7a1e0827dc2395b54d2815ea0e47bfb042779990820f235de4132d6c4568f49d7a393f9e6b4c2ae08379585bf8586a9e0e80a230c93db447ca090e6

      • C:\Users\Admin\AppData\Roaming\ajswjnecxhr.vbs

        MD5

        e951f9341d4925a74e7ca2a857c2ae93

        SHA1

        63c66e08f916a7251d97ae95070933e17776d3e1

        SHA256

        c806a7f19f74928137afeb93f9c52e9e354454604ed4f09d0ac9ade41b4fc4ab

        SHA512

        b81f3d2a1f055cbbc860f2421ae3b3958370ed9bc11a038cb84e9601b1a3d058af0b28a9b209f961074957339ed4449d6d0cf586254674859a4c0001f5452278

      • memory/752-54-0x000007FEFBE11000-0x000007FEFBE13000-memory.dmp

        Filesize

        8KB

      • memory/772-61-0x0000000002860000-0x0000000002861000-memory.dmp

        Filesize

        4KB

      • memory/1156-59-0x0000000002840000-0x0000000002841000-memory.dmp

        Filesize

        4KB