Analysis

  • max time kernel
    114s
  • max time network
    119s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    28-01-2022 17:25

General

  • Target

    f752698342d8dc62ff0e27a065e79c71bca87604ef786f838fc8e0513ce97cfc.vbs

  • Size

    14KB

  • MD5

    508bbb9d8ef028dc531631bf254cf816

  • SHA1

    102b853fccb80598a04fbb8f81dd0143882a2a3b

  • SHA256

    f752698342d8dc62ff0e27a065e79c71bca87604ef786f838fc8e0513ce97cfc

  • SHA512

    9079a08ac3f85485c198df7ba6ff523e8bb2133d7e5da39a81ea9b92fb8f133cf111193970f897cb11c736aa76dec0cb4408bf5622f5afa758da0b03b25c7e88

Score
10/10

Malware Config

Signatures

  • Lampion

    Lampion is a banking trojan, targeting Portuguese speaking countries.

  • Blocklisted process makes network request 7 IoCs
  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f752698342d8dc62ff0e27a065e79c71bca87604ef786f838fc8e0513ce97cfc.vbs"
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\Windows\System32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Roaming\pxhhivmldyz.vbs
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      PID:1300
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0 /state0:0xa3ad0855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:2520

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\70730442941188\lllcqmzubdhdmoenn32190587878226.exe
    MD5

    2bbb32b0949043ccdc8f6543746a7035

    SHA1

    7841fa32d61d3c0e60e4a98d8b09fccdb37bd285

    SHA256

    ebdcaedd06e8ec9ddb2f3afda72fd33eb281f333f613e9faf582ff2485aa7396

    SHA512

    7ebb4939b38c17321a1767614e18e2bc13232efec2acdfc579318a729ec52cf4e3a6d4ebd46beeef509834b6dec047d3bae4dab339687df4cc3d6f71b75c4602

  • C:\Users\Admin\AppData\Roaming\pxhhivmldyz.vbs
    MD5

    07c3f32d62a5f888dcb90c4c9b3a817e

    SHA1

    33106d954628c947b25be1364d2db69a0b40a475

    SHA256

    cf6a4276aae3d3ecc1270c0ea768ed058c9ff4f92ae3161816646fefe27200e3

    SHA512

    fb01a0131e7dd3a65aa94f9dc5dbc94fae703e2d4d237ce59e2c9c090332e46ffbe0b366609cdd5f34ea281c003eabbb416ff1de4d76fd83a8720862917b90c7