Analysis

  • max time kernel
    64s
  • max time network
    64s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 06:03

Errors

Reason
Machine shutdown

General

  • Target

    Factura-Janeiro-2145892315-2019-10_25/Factura-Janeiro-2145892315-2019-10_25.vbs

  • Size

    24KB

  • MD5

    bbb4e37dc7a24682f9df59f585d3d39c

  • SHA1

    2a7083c11a32e63d6bab56f735a8b44b3759fafa

  • SHA256

    67508f5f5648be4ef1dcba284592fc1215efdfa90221c01fbda1069a46c956cc

  • SHA512

    6647ea9b16328409c198144be14615983ed89ef9d9243d84a2826fc85b4e4eb72048831d8315e3ccdbc40738d5ecd5249cc718b5bcfbe07fd7847357ca506b33

  • SSDEEP

    768:K3fvCAhLiqxEns40jnqwQRF0T3nf3ZHmao:MpC07qwQ3sXf3hmF

Score
10/10

Malware Config

Signatures

  • Lampion

    Lampion is a banking trojan, targeting Portuguese speaking countries.

  • Blocklisted process makes network request 8 IoCs
  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Factura-Janeiro-2145892315-2019-10_25\Factura-Janeiro-2145892315-2019-10_25.vbs"
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\System32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Roaming\odijsvcsyqm.vbs
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      PID:572
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:808
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:2152

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Defense Evasion

      Subvert Trust Controls

      1
      T1553

      Install Root Certificate

      1
      T1553.004

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        e26e0cea495136a470f6f5310c152059

        SHA1

        fa4b53977529beefb3831c9c24e81e04518f3659

        SHA256

        861a22e1233f130264f20a088c5478db01e0748582cb943e68bd7384fd03e147

        SHA512

        fcaa95c1b0e80873c50c08afb1c2d7d5446487df7f826f36f97a828da0237a16af275efc7246d8f6864ae8b2dfee257fa5776889d0e06e5878c934f49c85d306

      • C:\Users\Admin\AppData\Local\Temp\Tar9ED6.tmp
        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\Users\Admin\AppData\Roaming\26575016915797\zluvdymmbszvaaqig60315313220023.exe
        Filesize

        339B

        MD5

        3d83af1d5e8278e3b205529db9816d9a

        SHA1

        9994fa417c164f21f291fe3f2f421bb3fd358bdc

        SHA256

        777c4ef8a9db483a372fb47ee584bf8d2333fa30a91bd381875dd8d59a583983

        SHA512

        6cb4f6f0a41366c72f911902139b98ec1a13b08cd4a1733560a61e03eacfc0249e57c7b316dc6644ffbdc03ac69b47119897ef45078f41340243291c76fea316

      • C:\Users\Admin\AppData\Roaming\odijsvcsyqm.vbs
        Filesize

        653B

        MD5

        82273e6c6983c899fa4d154abfebc9c4

        SHA1

        073051221dba2e0d19bd7c1be364a93fdc9a0e44

        SHA256

        b69643a63ec10d92f58b791951aeedec7d8eeed86abbd8ae9a0ba8837d505c3c

        SHA512

        4cd77c2addd6be262b3093bd0319826975cca3025e66d8382e540889eac20979c984e54f7304d88902a8c0484befc1b037f53c53c27e2f92fb59b82f386a5e6b

      • memory/808-161-0x0000000002D90000-0x0000000002D91000-memory.dmp
        Filesize

        4KB