Analysis

  • max time kernel
    122s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    28-01-2022 20:34

General

  • Target

    643d400cbdcff21ca2c0b8539f6990e22ababc740ced01f466150e44b669edf5.vbs

  • Size

    14KB

  • MD5

    af824991d302e19cfe49a158f5aa7320

  • SHA1

    edd17041aa85f80941f973b4db3506752207920d

  • SHA256

    643d400cbdcff21ca2c0b8539f6990e22ababc740ced01f466150e44b669edf5

  • SHA512

    d06ecfc43d22b13db0982120c551078009c6b9b8adf2de5f4d6b432d1aac5a85766a41b17eb730d1397eb522035ff468efadf1f68ad98833bdcb774f625fec35

Score
10/10

Malware Config

Signatures

  • Lampion

    Lampion is a banking trojan, targeting Portuguese speaking countries.

  • Blocklisted process makes network request 8 IoCs
  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\643d400cbdcff21ca2c0b8539f6990e22ababc740ced01f466150e44b669edf5.vbs"
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Windows\System32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Roaming\xbsutxgciyf.vbs
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      PID:1740
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:876
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:812

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\74559864938258\ijefeaqwkaruyyugm81960988879203.exe
        MD5

        08528732bf2f47b5addee3bbb038459b

        SHA1

        937e853a4d859c4044fe4151012f558add9f0e44

        SHA256

        d364fa0975c02fc868d89a0f2051b4f2ba73a5798a420624463dacb5e51165a1

        SHA512

        cc2435976afcfb1bb98f4d7a0d2a0b1fdd2368e720fd716ffc0b2f567a8261f9d8596bc2d96f65b0a7285868045a343988288cc1c6c73ad5e3517bb5c9fd83e8

      • C:\Users\Admin\AppData\Roaming\xbsutxgciyf.vbs
        MD5

        a0594ad0a3e45376c649200aa618d629

        SHA1

        25c17d552b3153699794278396b26d1d4a7fb2be

        SHA256

        a21b5bee666476d8eded20061a29d7a5740888e0985b8198ca073f8118db78ba

        SHA512

        fa3ff39fdd10114a316574846bab5e50fb8185309d6f91c9e7452f248c6c93f91b21174e96fc1d96ff2df4af159e40a2714770e45feddaf0e64858874394f5f7

      • memory/812-62-0x0000000002760000-0x0000000002761000-memory.dmp
        Filesize

        4KB

      • memory/876-60-0x00000000027C0000-0x00000000027C1000-memory.dmp
        Filesize

        4KB

      • memory/952-55-0x000007FEFBEB1000-0x000007FEFBEB3000-memory.dmp
        Filesize

        8KB