Analysis
-
max time kernel
63s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
Factura-Janeiro-2145892315-2019-10_25/Factura-Janeiro-2145892315-2019-10_25.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Factura-Janeiro-2145892315-2019-10_25/Factura-Janeiro-2145892315-2019-10_25.pdf
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Factura-Janeiro-2145892315-2019-10_25/Factura-Janeiro-2145892315-2019-10_25.vbs
Resource
win7-20240221-en
Errors
General
-
Target
Factura-Janeiro-2145892315-2019-10_25/Factura-Janeiro-2145892315-2019-10_25.vbs
-
Size
24KB
-
MD5
bbb4e37dc7a24682f9df59f585d3d39c
-
SHA1
2a7083c11a32e63d6bab56f735a8b44b3759fafa
-
SHA256
67508f5f5648be4ef1dcba284592fc1215efdfa90221c01fbda1069a46c956cc
-
SHA512
6647ea9b16328409c198144be14615983ed89ef9d9243d84a2826fc85b4e4eb72048831d8315e3ccdbc40738d5ecd5249cc718b5bcfbe07fd7847357ca506b33
-
SSDEEP
768:K3fvCAhLiqxEns40jnqwQRF0T3nf3ZHmao:MpC07qwQ3sXf3hmF
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
WScript.exeflow pid process 20 5016 WScript.exe 22 5016 WScript.exe 24 5016 WScript.exe 26 5016 WScript.exe 28 5016 WScript.exe 36 5016 WScript.exe -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gdgwjlrspqk.lnk wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "233" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
wscript.exedescription pid process Token: SeShutdownPrivilege 3956 wscript.exe Token: SeShutdownPrivilege 3956 wscript.exe Token: SeShutdownPrivilege 3956 wscript.exe Token: SeShutdownPrivilege 3956 wscript.exe Token: SeShutdownPrivilege 3956 wscript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 3552 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WScript.exedescription pid process target process PID 5016 wrote to memory of 3956 5016 WScript.exe wscript.exe PID 5016 wrote to memory of 3956 5016 WScript.exe wscript.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Factura-Janeiro-2145892315-2019-10_25\Factura-Janeiro-2145892315-2019-10_25.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\System32\wscript.exewscript.exe C:\Users\Admin\AppData\Roaming\gdgwjlrspqk.vbs2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39bc855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
339B
MD5f9ae8732bf095985f46265120380e4f5
SHA1adc86b57583be42dc06cad15ff5341973c3f3104
SHA256ded846234930e477523e3608b5a979b667eaebc3452eb1c2b2e47f27570d2343
SHA512c88e5bf4da7d669dbd4903ac9ebc7cd3925a7746f49cbd546fda78dd42b06eb0fac36dfd4e0d4291a80ce551fc43b1a34a11584b3982ef767207db4c25c04948
-
Filesize
653B
MD5d90fa910018aebfb8ce02ae50a628239
SHA1a10bbff548f68f26dd08770782191b65b5504891
SHA256c630e191732aac3d76c1ab0d12da59837d3e3ee217be75b2f0acb751d5c4c338
SHA512796e83699c7678f62e0077dca037cddd81d84c0da8f9fd6e70a829b64768ac9ca21cc533a949e0c574db4b138ff6b1c474e2bde44f6a74f333bad735c6abca2d