Analysis

  • max time kernel
    114s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    28-01-2022 17:25

General

  • Target

    f752698342d8dc62ff0e27a065e79c71bca87604ef786f838fc8e0513ce97cfc.vbs

  • Size

    14KB

  • MD5

    508bbb9d8ef028dc531631bf254cf816

  • SHA1

    102b853fccb80598a04fbb8f81dd0143882a2a3b

  • SHA256

    f752698342d8dc62ff0e27a065e79c71bca87604ef786f838fc8e0513ce97cfc

  • SHA512

    9079a08ac3f85485c198df7ba6ff523e8bb2133d7e5da39a81ea9b92fb8f133cf111193970f897cb11c736aa76dec0cb4408bf5622f5afa758da0b03b25c7e88

Score
10/10

Malware Config

Signatures

  • Lampion

    Lampion is a banking trojan, targeting Portuguese speaking countries.

  • Blocklisted process makes network request 8 IoCs
  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f752698342d8dc62ff0e27a065e79c71bca87604ef786f838fc8e0513ce97cfc.vbs"
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Windows\System32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Roaming\cenvdcojuqw.vbs
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      PID:1212
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:912
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1100

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\39052739083766\mmzhofzdxrjtckvvn33468572497367.exe

        MD5

        94e829233a4d4519c2098080920193c9

        SHA1

        6ce5d2a2f6564057695edb7549762151c99b1e94

        SHA256

        a087d032642496f490409eee72e8605e6983d01daa26bbfb278f343ae8a03c20

        SHA512

        a769af40bf1ea0ab0882ea39fab5824b47c4b06114f84b04259330d6da2017c2a2777febaa684911be9ea937050e40719fe69303a14812fea3950d008ba7b947

      • C:\Users\Admin\AppData\Roaming\cenvdcojuqw.vbs

        MD5

        3fca87285991f0b3aaeff03a8b8d5d1c

        SHA1

        317a676d79482db44e33ea212c54746b5db8b788

        SHA256

        09d3f6a5a0c3d6ce6559490061992d7ee0fdbf975ff2b5b9ce7f4192d7752f52

        SHA512

        1adb802e7fe6765a1561962a6cefed811c28d7f8b071399d5257375d646a7c7e8d31a8d922009001acee38db7f57c9a9b74e4bdd981d2b074f90b0879ff630a1

      • memory/912-58-0x00000000027C0000-0x00000000027C1000-memory.dmp

        Filesize

        4KB

      • memory/1100-60-0x00000000026E0000-0x00000000026E1000-memory.dmp

        Filesize

        4KB

      • memory/1308-53-0x000007FEFC511000-0x000007FEFC513000-memory.dmp

        Filesize

        8KB