Analysis

  • max time kernel
    82s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 09:05

General

  • Target

    d1840a5a846f8799b6b28fd3ece9125a4ac9bf94de13010573723ec3546944c1.vbs

  • Size

    10KB

  • MD5

    d7a54b62097678df7ad6a0d2871dc342

  • SHA1

    0a0ff21cc2c81d4a7de738d944445e48ed9ef314

  • SHA256

    d1840a5a846f8799b6b28fd3ece9125a4ac9bf94de13010573723ec3546944c1

  • SHA512

    813a82139954ec7669829b8d0cf270657ce64a2d8294a1b35e3d9a6212af3af7905f9e386ad3dff03ba9fddf595c25388620cf01ea29e9ae22798aa7e01b2637

Score
10/10

Malware Config

Signatures

  • Lampion

    Lampion is a banking trojan, targeting Portuguese speaking countries.

  • Blocklisted process makes network request 8 IoCs
  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d1840a5a846f8799b6b28fd3ece9125a4ac9bf94de13010573723ec3546944c1.vbs"
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\System32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Roaming\fodpazkehic.vbs
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      PID:1232
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:272
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1212

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Install Root Certificate

      1
      T1130

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\43583088815211\pwpblcvykkofipfou25255330920218.exe
        Filesize

        333B

        MD5

        95daf09e8b0a3dd30613f5033fb5b72e

        SHA1

        5b28ec4fd15f1ac61358ba997e77ae1619be476e

        SHA256

        cf026f88c59a27decfb3d3d968f480ed80dc500fc1403d4958b7bd8c41c17667

        SHA512

        b98595a7481d96d55020800820c1f9de29c316aa88f3aad4f7b38b400b742f62d451b28db52bd7ac3bb9da3cb1928dd4d89708bf8e848c2f406b705aa9ff5a8b

      • C:\Users\Admin\AppData\Roaming\fodpazkehic.vbs
        Filesize

        653B

        MD5

        ddf26ce6362cfeadb41cc7fde8f2e762

        SHA1

        4fb3301ca17e053e2d33639f34d677f4bf7fbaec

        SHA256

        211bce001997a2de62162f432916fd9ad5618337729c818cf19e9c01e4f3f2a3

        SHA512

        a7078635c6be0a521677e57dc252c8ef3921096b5c7af9235119b66d97f5920f4f762168ea289f6cf9143db3d1c6e6244473c8744c02334faea3c329e5f1cd25

      • memory/1232-55-0x0000000000000000-mapping.dmp
      • memory/2040-54-0x000007FEFC341000-0x000007FEFC343000-memory.dmp
        Filesize

        8KB