General

  • Target

    lnvoice-1129374589pdf.vbs

  • Size

    2KB

  • Sample

    230524-hzvxaabh4s

  • MD5

    b3183c5fe842266103ad470b285015d9

  • SHA1

    52e19cc1e888ae97b34ac3bf3b81fd713edeb2db

  • SHA256

    9ef6905558a6d20b3e358c68fe868535f8af6333d9345a0c8d5f421462fb657e

  • SHA512

    d36409806afbc8a4ce5eb08ffad386e440da7bbb0bed81adfbffc1cb2b0b98bd88ad9e62b57b05757003de1adcc4eb1bb70c59ae85fe60ab4a71c3be8be664b5

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://cff66d08-d3f8-42db-911c-ce670399a441.usrfiles.com/ugd/cff66d_474c983f67584a68b9747c126f9d9aa2.txt

Targets

    • Target

      lnvoice-1129374589pdf.vbs

    • Size

      2KB

    • MD5

      b3183c5fe842266103ad470b285015d9

    • SHA1

      52e19cc1e888ae97b34ac3bf3b81fd713edeb2db

    • SHA256

      9ef6905558a6d20b3e358c68fe868535f8af6333d9345a0c8d5f421462fb657e

    • SHA512

      d36409806afbc8a4ce5eb08ffad386e440da7bbb0bed81adfbffc1cb2b0b98bd88ad9e62b57b05757003de1adcc4eb1bb70c59ae85fe60ab4a71c3be8be664b5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops startup file

    • Registers COM server for autorun

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks