Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
Income tax return for Dircon Construction LLC.wsf
Resource
win7-20230712-en
General
-
Target
Income tax return for Dircon Construction LLC.wsf
-
Size
137KB
-
MD5
1d733488ff0c33ff91b29d6ba0218ab5
-
SHA1
588633522abe168911aa9f0566ebd4c8f7db869e
-
SHA256
0bafff7ce08cfb66ce61ad3cb87d0373c54d8460606813b365121799d2da377a
-
SHA512
4529e92369efa0d76af65d8a19b06a730f7022d16be56c1b9e2a566eff94aada06094aee0ca13d75584b4dd941b914fcc540c7d4f7811a25104e02208ac23f29
-
SSDEEP
768:sXh/6FXh/6qXh/6FXh/6XXh/6AXh/6/Xh/6nXh/6TXh/6zXh/6kXh/69Xh/6BXhe:CNxkbO
Malware Config
Extracted
vjw0rm
http://50.114.32.155:7974
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 6 1712 WScript.exe 100 1712 WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133374496292846977" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3288 chrome.exe 3288 chrome.exe 4100 chrome.exe 4100 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe Token: SeShutdownPrivilege 3288 chrome.exe Token: SeCreatePagefilePrivilege 3288 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe 3288 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1712 wrote to memory of 3288 1712 WScript.exe 83 PID 1712 wrote to memory of 3288 1712 WScript.exe 83 PID 3288 wrote to memory of 1832 3288 chrome.exe 85 PID 3288 wrote to memory of 1832 3288 chrome.exe 85 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 3852 3288 chrome.exe 87 PID 3288 wrote to memory of 2728 3288 chrome.exe 88 PID 3288 wrote to memory of 2728 3288 chrome.exe 88 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90 PID 3288 wrote to memory of 5028 3288 chrome.exe 90
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Income tax return for Dircon Construction LLC.wsf"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://bit.ly/3QTQCiJ2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7fff374a9758,0x7fff374a9768,0x7fff374a97783⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1892,i,15651591277596923434,12818993062226772112,131072 /prefetch:23⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1892,i,15651591277596923434,12818993062226772112,131072 /prefetch:83⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1892,i,15651591277596923434,12818993062226772112,131072 /prefetch:13⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1892,i,15651591277596923434,12818993062226772112,131072 /prefetch:83⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1892,i,15651591277596923434,12818993062226772112,131072 /prefetch:13⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4604 --field-trial-handle=1892,i,15651591277596923434,12818993062226772112,131072 /prefetch:13⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3416 --field-trial-handle=1892,i,15651591277596923434,12818993062226772112,131072 /prefetch:13⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5260 --field-trial-handle=1892,i,15651591277596923434,12818993062226772112,131072 /prefetch:83⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 --field-trial-handle=1892,i,15651591277596923434,12818993062226772112,131072 /prefetch:83⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 --field-trial-handle=1892,i,15651591277596923434,12818993062226772112,131072 /prefetch:83⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1892,i,15651591277596923434,12818993062226772112,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD58dc52c680bd912bf1d36fc8b0dbe351e
SHA16ea45e41d11bae25af0891b37ac0016455ce4d38
SHA25659f2995d74f41114e1a84af4a7a365e71ab42595925a8fc547c3c8aa25a8ea58
SHA51223afa2e7c586aa8326ce122aef7072d0addd75fb1702e9964efffa6baf4890c25363a3147a28203f1ee4ebc67050f2a1136691e9ed278f1c69340c2ea3683388
-
Filesize
3KB
MD510916cca26063a90bf631c8589ac3dad
SHA12df8efc72b88c5057d2bf49cae19f260c9a5b974
SHA256de8582e09aff78492f8f62ec96d08f9b4325dec0e358c0154970d0d8d4993980
SHA5129916a7f413535be007031d6ae175a86fb937b7107d2d500cf386883d2df060f27777dbd181ec357e16a282037cbf1b9ebc679eab3498f636b3f5bb40e9e1028d
-
Filesize
1KB
MD502dd51db71589da6a9b38e06ee53c585
SHA19a8fcefc19b63cefd601ebb3e5be6009a9327092
SHA256a7123e2a05c9e32fa5ac7a56e3aa08a3d44b763c6b57264e759794255973a426
SHA512a9025f08fa81fedc4530aadca0ffba32b0ffde1bc2efd5a8abeef62aa56a2c21b532041dfc9d7c7a0150c83c8a4b54e446a659042ff747710e7c266a5499a3c6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\f135ee1c-2fde-427e-be73-0499c258d4b7.tmp
Filesize3KB
MD5e706867444b8cdaacb7441e0b34a6e9a
SHA1a5bb7846748f19e457d29109f002b66233867d0f
SHA256c6a07664cf2c1fc809ef127f3e9c7aaeb7fb010770aec80cb220f730b9426395
SHA5120b63ef5d9e02785ebe11d580e5d25b15e5559b30fdb200d4b41a0bf81eea9d8185633e2c0d529017341d9f92620ff1bc9e3e0bcd7fbc09e251c1cfac74d04f6b
-
Filesize
6KB
MD538b8eba3c089e5f46e6df3cb885a35ba
SHA19a5b0c1d5518e9dcfcfdac864bc3347652d13bbf
SHA256a2f0c016431d3fc14aa624bb0bffeeefa7369c9ffec78a1a75e0c679d79ff647
SHA512502680b874fa736f2c0f6240e5318ef8ac27d2b99c765657113960508fe36fb84347f3941bdbe37779115567ea38437f1f774496550de6ecf2ff09167a34701f
-
Filesize
15KB
MD505560816d2ba7e613a39b7bf0442a307
SHA1f22798987ae72ea70d1220379a9d7f04ad342214
SHA256c913b6b19bc6c753e685e3c7fe2fd151a7e007ae5e0b7423ee08bca425e50957
SHA512ef00d247c65fe404c5533a9f813e421dd4d9794c1a05acd9fa4af9d75d67ab3f0a862257481ef0e015b18d683277fc619d5fb35093f44cf4c26b5f7cec05461a
-
Filesize
178KB
MD518406de5c60fb2bfc9958ea605c83ec7
SHA1af2c2b39aa687de0ca87b149324af9afab9529ec
SHA25614bc43ba52ba9865f2daa4a1d776ab79704135f7da56ad910055ad39a5cc0186
SHA51285dc67716b0a05cbd97330f9dddf9e4587defa05f0ce3ee6973800317deebc386ab04b14d551d39d234f057bf5568d995db9ad38273b8abd9b26cdc690c220c0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd