Analysis

  • max time kernel
    94s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    28-01-2022 22:34

General

  • Target

    07f5932be35a720a74fc10e7ee6011fa2a8ee4c6df7cf9a6f06bfdc7bd5ec4a1.vbs

  • Size

    22KB

  • MD5

    6d5196d8d9cd129b0f257f07ede9e6ab

  • SHA1

    14095c55c59db1f8bc00de1781a6641bf2657d65

  • SHA256

    07f5932be35a720a74fc10e7ee6011fa2a8ee4c6df7cf9a6f06bfdc7bd5ec4a1

  • SHA512

    4dc375ebb0a26d1b92ecad9611098e425b9a02c0bf95bf4271ae88e1a931091ca6ed8f088a728affa2d59935e1243c5ed9263bb059d0fa6609e507e6d1b2f004

Score
10/10

Malware Config

Signatures

  • Lampion

    Lampion is a banking trojan, targeting Portuguese speaking countries.

  • Blocklisted process makes network request 8 IoCs
  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\07f5932be35a720a74fc10e7ee6011fa2a8ee4c6df7cf9a6f06bfdc7bd5ec4a1.vbs"
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Windows\System32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Roaming\mflrpvgtlnv.vbs
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      PID:1924
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1904
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1080

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\13038350045680\xnydayqnophcnqmvv78749410510062.exe
        MD5

        0572b75a08e13722f7093c6b9c3bfaa9

        SHA1

        a07d1ad204d0d70ecc7663773f00a05b60b3f7a6

        SHA256

        5bc29763bbd7a2950ded4bb02bae55fa4f1910e9147ed6bbb84f7732d7e04d29

        SHA512

        9a0c6097839b4fbddee36580a50815c06b7e18aa60ca8ae89e83461b1e2ba5f7f31d116d9f2b7d50dfc0d63cee544dfe4fd0b43ba2c04474f808ac11770c8c2c

      • C:\Users\Admin\AppData\Roaming\mflrpvgtlnv.vbs
        MD5

        b715541d883f46169a2124c7745965ec

        SHA1

        d4fbd591d90c26b60c3c0b74320b3c1baa75ff3a

        SHA256

        da12251f3fe1a6b93a107fe78bbb38f6073fe193350ef199ee4ab8ded6da3792

        SHA512

        fae93019393d3780123cbeb0df4c46687e6eb4aaeaedf81215f935212cc2fb496933a18061a1b030012cc03b57f2b7e7d455f0ea3f33a14067a78c0702ab4e90

      • memory/948-55-0x000007FEFC2A1000-0x000007FEFC2A3000-memory.dmp
        Filesize

        8KB

      • memory/1080-62-0x0000000002820000-0x0000000002821000-memory.dmp
        Filesize

        4KB

      • memory/1904-60-0x0000000002820000-0x0000000002821000-memory.dmp
        Filesize

        4KB