Analysis
-
max time kernel
4s -
max time network
5s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 10:47
Static task
static1
Behavioral task
behavioral1
Sample
Comprovativo-de-transferencia-ID-yq5da6zfj6h-PDF-23/Comprovativo-de-transferencia-ID-yq5da6zfj6h-PDF-23.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Comprovativo-de-transferencia-ID-yq5da6zfj6h-PDF-23/Comprovativo-de-transferencia-ID-yq5da6zfj6h-PDF-23.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Comprovativo-de-transferencia-ID-yq5da6zfj6h-PDF-23/Comprovativo-de-transferencia-ID-yq5da6zfj6h-PDF.pdf
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Comprovativo-de-transferencia-ID-yq5da6zfj6h-PDF-23/Comprovativo-de-transferencia-ID-yq5da6zfj6h-PDF.pdf
Resource
win10v2004-20240508-en
Errors
General
-
Target
Comprovativo-de-transferencia-ID-yq5da6zfj6h-PDF-23/Comprovativo-de-transferencia-ID-yq5da6zfj6h-PDF-23.vbs
-
Size
24KB
-
MD5
c66f748e72e6070e0e7a99f1e9b3e29c
-
SHA1
5f1342f7d84032945cb2cfc0935e2c0a1229d3e8
-
SHA256
6be47a0e90c156e136a72dd94af8d0217fb4152c0dc6171702ceaa306d62e857
-
SHA512
153ccaf14b33c62be399db5e05463914b7361ed077f80c821d348639f11c6fa228aa31dda6e7ed9064c63f23715bb28190f92dc838de3a969cf5f9a03b3ab10e
-
SSDEEP
384:zBuvP5UVtahoAPQVpuNzgGXlU+4Lvoty5x4RSKKY6YcceWDX3SMdcjasjfG5ulvg:QZ4PONrlUvp5+/KYrcc7XXcjaZVV
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
WScript.exeflow pid process 3 3196 WScript.exe 7 3196 WScript.exe 9 3196 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bmyjdqpitmd.lnk wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "118" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
shutdown.exedescription pid process Token: SeShutdownPrivilege 4832 shutdown.exe Token: SeRemoteShutdownPrivilege 4832 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 1400 LogonUI.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
WScript.exewscript.execmd.exedescription pid process target process PID 3196 wrote to memory of 2160 3196 WScript.exe wscript.exe PID 3196 wrote to memory of 2160 3196 WScript.exe wscript.exe PID 2160 wrote to memory of 1620 2160 wscript.exe cmd.exe PID 2160 wrote to memory of 1620 2160 wscript.exe cmd.exe PID 1620 wrote to memory of 4832 1620 cmd.exe shutdown.exe PID 1620 wrote to memory of 4832 1620 cmd.exe shutdown.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Comprovativo-de-transferencia-ID-yq5da6zfj6h-PDF-23\Comprovativo-de-transferencia-ID-yq5da6zfj6h-PDF-23.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\System32\wscript.exewscript.exe C:\Users\Admin\AppData\Roaming\bmyjdqpitmd.vbs2⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c shutdown /r /t 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\shutdown.exeshutdown /r /t 0 /f4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3943855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD531b3fa3be13c3eca988b6647cf274003
SHA1713779818be4a9956a02f8e16231750a9e0c3eb8
SHA256881aa5538ac02efb941f6cbef4e784f5e4a4a0c70611cc6b7e7e461f21c65f97
SHA512ba1fddaaa64e0bdc2418d615b2a34683167fc336d12109e29574c3cec51a93d16908bf155b96d0d8c4537b185caa7ee29c3eb6a84074ef366cd161b0fe8eb1bf
-
Filesize
499B
MD5bf575da97a5e02e1f068e545ed8c7514
SHA1de59773c985002b5f96fd0a2920243897669da8f
SHA256aff0f1a9c7babc9129c490c583ed3d243303de83754c8fa01bacc0ee94965e67
SHA51228afbd50cfc847d9dc0263187480db7562439f9ab3275d560cd4afaa1b35225e39c5d3107a446309cd4d54e60920d86cecaeca6352dad76d7b02dd7e1d603842