Analysis
-
max time kernel
60s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2023, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
vbn540.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
vbn540.vbs
Resource
win10v2004-20230220-en
General
-
Target
vbn540.vbs
-
Size
88KB
-
MD5
9eae6f49a02d6eb9f75af7bbf4349808
-
SHA1
2caf7ddeb9fc1d6076558661ef69b9638cfd2e7b
-
SHA256
31fb4bf411dcd7fcb860bdb1db26859290b047b39b94638a7d4fd2a46d323e98
-
SHA512
37b45c58efd8c2bee66c30bca4a3777d5b6ba39e97d34baa8e7bc27fb083397d818a2708cbcf7d4704398fdfff4cbc17abff68b33294292413527702c1ad7eef
-
SSDEEP
768:vvQxmTUdOGFf77IlCpfj2d7gtD/uqDX4l8EE1:vvQxxOGV77Fj2sDRX4lG1
Malware Config
Extracted
emotet
Epoch4
213.239.212.5:443
129.232.188.93:443
103.43.75.120:443
197.242.150.244:8080
1.234.2.232:8080
110.232.117.186:8080
95.217.221.146:8080
159.89.202.34:443
159.65.88.10:8080
82.223.21.224:8080
169.57.156.166:8080
45.176.232.124:443
45.235.8.30:8080
173.212.193.249:8080
107.170.39.149:8080
119.59.103.152:8080
167.172.199.165:8080
91.207.28.33:8080
185.4.135.165:8080
104.168.155.143:8080
206.189.28.199:8080
79.137.35.198:8080
103.132.242.26:8080
202.129.205.3:8080
103.75.201.2:443
149.56.131.28:8080
5.135.159.50:443
172.105.226.75:8080
201.94.166.162:443
115.68.227.76:8080
164.90.222.65:443
186.194.240.217:443
153.126.146.25:7080
187.63.160.88:80
209.126.85.32:8080
72.15.201.15:8080
153.92.5.27:8080
167.172.253.162:8080
147.139.166.154:8080
163.44.196.120:8080
183.111.227.137:8080
139.59.126.41:443
164.68.99.3:8080
188.44.20.25:443
94.23.45.86:4143
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 32 2656 wscript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation wscript.exe -
Loads dropped DLL 2 IoCs
pid Process 4216 regsvr32.exe 944 regsvr32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eZkGmZN.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\LHNZlmymDj\\eZkGmZN.dll\"" regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 32 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4216 regsvr32.exe 4216 regsvr32.exe 944 regsvr32.exe 944 regsvr32.exe 944 regsvr32.exe 944 regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2656 1420 WScript.exe 92 PID 1420 wrote to memory of 2656 1420 WScript.exe 92 PID 2656 wrote to memory of 4216 2656 wscript.exe 100 PID 2656 wrote to memory of 4216 2656 wscript.exe 100 PID 4216 wrote to memory of 944 4216 regsvr32.exe 101 PID 4216 wrote to memory of 944 4216 regsvr32.exe 101
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vbn540.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //E:vbscript C:\Users\Admin\AppData\Local\Temp\radD354ABEA0darrad1FF4637DFdar.txt2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" "C:\Users\Admin\AppData\Local\Temp\radC924C71E2dar\3Gw91Oh.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\LHNZlmymDj\eZkGmZN.dll"4⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
978KB
MD5732cbd16f6f3384f94eb7855707cbdfe
SHA10cc9b61ed379d2aa62b3453796732b0bc7b2005d
SHA256ab6dbb617473d38420f0593186c596fcce85ee838e169c0cba269ba8f5cf4539
SHA5122cc43d9a26daf1780f2c8c23b94f771714a3c85c62672f9ff9f2c4a820869725a057b6dc7914173b19e9b324ab7b660cd240a4df4351c21cc4acfc740451351e
-
Filesize
437.1MB
MD5c40650a35b560f5eb4918b17eea79e33
SHA126981ce2ca440698935f58e5fc4870ff0a087e54
SHA256cc0447fcdee24473a387dc642aa9a734ecd4d3b82ac039275dc3a29bb7c5c450
SHA512335a30fc70d90a7fbf634a6a47fc492531a8fca289ba10503a73311f056d9266fb7b28ce90e78dc8c1ffae3d549ebffa07d6e95607f31d9125ef216c15ce9877
-
Filesize
413.1MB
MD593c5c26eedce59fd9b47fe9feb37720e
SHA160fc3078a1f5d414bc9e7a8d37963ea1575dd787
SHA256e966d134282116a30c14f698906668637500b0ef98069d00b92f7d9e5db5773d
SHA512adb0a066a25f94dd0eb9a1572b0d1626d6eac62d10317b7c6a625f280f1c3b8e615dd472c2d74d6bde6702b4ca76ff0213da53fb21071165aca6b69226cd5c44
-
Filesize
61KB
MD51aa67b0b904cd763bc3818467b021b3c
SHA1687946e6661f96d332b8e57cab5ab2e84ca17071
SHA2560fc30c263b4e947d2b4f7ca5e1ee57e2aa4a4e885796f15cd3e16fb03f255716
SHA5129f8d53567998c8beb7977c470e09d4ad1a41da2555d6b7ca0b7525f70f6bba5f818aaf9a5dcbb57c7b9842e937eb5a7a64f45394f42afb2a78b09dee1493a7be
-
Filesize
414.3MB
MD5b64c7ff1f58587da6bcbb6f85cf72cdd
SHA13c83bf69467b94ce6897ad94c54ab2d296991896
SHA2567bc7ad69a6e72441fb81ba05048cfca53627346648f95218739eb89f008ac7dd
SHA512044cfff061ecc927eed85275db2576119f41fcae981321b6b69aeb9b69d649b19d943206083b0756b46e2c6a0c549f1bb00f0552cdc7afb09949c14517d46dec