Analysis

  • max time kernel
    143s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 09:05

General

  • Target

    d1840a5a846f8799b6b28fd3ece9125a4ac9bf94de13010573723ec3546944c1.vbs

  • Size

    10KB

  • MD5

    d7a54b62097678df7ad6a0d2871dc342

  • SHA1

    0a0ff21cc2c81d4a7de738d944445e48ed9ef314

  • SHA256

    d1840a5a846f8799b6b28fd3ece9125a4ac9bf94de13010573723ec3546944c1

  • SHA512

    813a82139954ec7669829b8d0cf270657ce64a2d8294a1b35e3d9a6212af3af7905f9e386ad3dff03ba9fddf595c25388620cf01ea29e9ae22798aa7e01b2637

Score
10/10

Malware Config

Signatures

  • Lampion

    Lampion is a banking trojan, targeting Portuguese speaking countries.

  • Blocklisted process makes network request 7 IoCs
  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d1840a5a846f8799b6b28fd3ece9125a4ac9bf94de13010573723ec3546944c1.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Windows\System32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Roaming\wsddvmfcqyd.vbs
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      PID:4976
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa3a09855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4864

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\20553685128688\gaqogppwtapdnllqc48916173815726.exe
    Filesize

    321B

    MD5

    49a863cf917e135403bba7e2c7c37792

    SHA1

    e077fa08e233bead25b18687d15096a91097277a

    SHA256

    a61f2d652a9c23ece25a50482f250b54a2902cfc382f218ed28e8d243ba56b14

    SHA512

    2d46628e0161a409bcb91c36e3596dfe188c080647b133f87bf769cbc1198b0f2d277b42d818b634165ccfa027a8802e35103b94b9bb8ba719dcccbf9f52ee71

  • C:\Users\Admin\AppData\Roaming\wsddvmfcqyd.vbs
    Filesize

    653B

    MD5

    f6efdef43917d150051c7e8d3daf0d68

    SHA1

    06e954617645877f4f66c56743414e74ccfbebdd

    SHA256

    a977f563d131b0db6bb80779b9bfd30ac5de79152e1190d0b2ee5762c12752c2

    SHA512

    48d94a7c99668085c5e80304a4c131dc4ffc618546dfe26e33d3c285c63b89160692579fe3ccd4195264384bac6a0632dbc9e0cb94191144520006dbad7a7f17

  • memory/4976-130-0x0000000000000000-mapping.dmp