Analysis

  • max time kernel
    98s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    28-01-2022 20:55

General

  • Target

    54cce7adca859d6bd85779ec7fa4fc7eb327f5067d25b1dada722ccdcf108281.vbs

  • Size

    26KB

  • MD5

    466193ad538dc185fbba76162241f970

  • SHA1

    cbf40697821fcf23e1d172cf7805641ab4380d44

  • SHA256

    54cce7adca859d6bd85779ec7fa4fc7eb327f5067d25b1dada722ccdcf108281

  • SHA512

    629b872de69c9be660172016afb7ce96c3cba9921f1205046195e9fb10518c24dd4e17365734a0bdcc5ae87c9c148881106e4aa284b90861eed6800c4fee056c

Score
10/10

Malware Config

Signatures

  • Lampion

    Lampion is a banking trojan, targeting Portuguese speaking countries.

  • Blocklisted process makes network request 8 IoCs
  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\54cce7adca859d6bd85779ec7fa4fc7eb327f5067d25b1dada722ccdcf108281.vbs"
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Windows\System32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Roaming\kxegyqcierb.vbs
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      PID:796
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:928
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1568

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\29972401559352\ufqrjtnchtnbrblbo98885976672172.exe

        MD5

        ef3dca17cb061a49e4ae3ab54e2693b8

        SHA1

        58db05491d31a5a4dbafe4a43e7d0b951ad5ba89

        SHA256

        853428950c8ea9285e3b48512e35901471b0dcd9449dc65af1d0673aafdc293f

        SHA512

        be425ebfa2879e822fdc303bb338e6809f9ee2d208fa855886fd306d2e75b264f3d08c4c06cee2280ef9e6e2722261fad23360e535495affa0b2a982e8d8a97d

      • C:\Users\Admin\AppData\Roaming\kxegyqcierb.vbs

        MD5

        341fbd237e8da15ace7ea8ba1eeb60d8

        SHA1

        0bca80aa57d0578ac42f6507bfcd855c41b8c612

        SHA256

        cb354af69a49062a861d15d52494fd4c77b8ab3f8fa9a6eb9e2c5091b48bb76d

        SHA512

        c891d2bdafce53e863bb1c606211fe03bd2e3fb184f541e09f4692d02fd3411ba817ee7ba6c0f1efded341ec401b70d4a703adb3730fccad3b2bb84d9be5a1ce

      • memory/928-59-0x00000000027C0000-0x00000000027C1000-memory.dmp

        Filesize

        4KB

      • memory/1568-61-0x00000000026C0000-0x00000000026C1000-memory.dmp

        Filesize

        4KB

      • memory/1576-54-0x000007FEFB571000-0x000007FEFB573000-memory.dmp

        Filesize

        8KB