Analysis

  • max time kernel
    93s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    28-01-2022 21:24

General

  • Target

    418dbcf5f8d5ad7e16a0bb48c1e14cb269bf5bd814f0a70c3aa90ce787136047.vbs

  • Size

    13KB

  • MD5

    3350e74a4cfa020f9b256194eae25c12

  • SHA1

    7f5960ff9feff30d2f4a4c1598dd22632ceea0cb

  • SHA256

    418dbcf5f8d5ad7e16a0bb48c1e14cb269bf5bd814f0a70c3aa90ce787136047

  • SHA512

    0e880c29ebfd77bfd17713b1fef3f8d6177c6d34d456bf74150d48c6ce9b608fb654410fb724f6e04343abe5716b839c693bca66feb904b49569a11cf696b7fb

Score
10/10

Malware Config

Signatures

  • Lampion

    Lampion is a banking trojan, targeting Portuguese speaking countries.

  • Blocklisted process makes network request 8 IoCs
  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\418dbcf5f8d5ad7e16a0bb48c1e14cb269bf5bd814f0a70c3aa90ce787136047.vbs"
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\System32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Roaming\tbgjidqpsfz.vbs
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      PID:1196
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1932
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:796

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\22228962838648\djtvtgbjvhlrpyuyf19998372912406.exe

        MD5

        47370e38e91181b2ad2ce3e0a0bf2394

        SHA1

        3f94b25810abe91f9278b2b6855562c59ad271e7

        SHA256

        ed75f17217f52b96fe880300eabde3675d3ae327bc5e3e07da689fa536c86b77

        SHA512

        8f3f95d8dd1daaa9fbcd28a8dd2a453fc3de3abacaedeb9040b5ac8a5cf625f5e717c1e35bf1bfd4a995e96e57e295ea2ab0362fa571cb3db3f9e66a8daf4f06

      • C:\Users\Admin\AppData\Roaming\tbgjidqpsfz.vbs

        MD5

        d92364e996f2a9a1334406ac56e801c4

        SHA1

        b4bab5748294b2a104ea525e55eb145bd00bcaa6

        SHA256

        e0b12fe5feeaeaa3c5ca56fe3e15031d0ce01a3dd6dadf277c706b0618554d6c

        SHA512

        d87f4f169fb999e976bf9a676da3028733bf4f741ad6c4efeef06cf007b1747c65c1033b7a0bbc7617c93b6b649799564f644762b4d10ec4b4c8b6d1f7d1bf1b

      • memory/796-61-0x00000000026D0000-0x00000000026D1000-memory.dmp

        Filesize

        4KB

      • memory/1680-54-0x000007FEFBE91000-0x000007FEFBE93000-memory.dmp

        Filesize

        8KB

      • memory/1932-59-0x00000000027C0000-0x00000000027C1000-memory.dmp

        Filesize

        4KB