Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2024 09:29

General

  • Target

    Bestellung.vbs

  • Size

    1.1MB

  • MD5

    fb74f970b27703e29d97dda20ce839fc

  • SHA1

    bb60d1e8a7d4ebee9651f97cf8d4b77eba3d4f9d

  • SHA256

    2287a97cf2d6372b8d60b9b1bb7d3d1b712605b33993868724ad8402261785e5

  • SHA512

    32e715fba256862bc0e39eab9f248315d5d9048a0f41f3a8fa9f2e0b3ef656a75f144093b80bbe76527cd0de90cb33df63f9df2c9f51719b941f8da437cd715c

  • SSDEEP

    12288:suQGQZybQ9+p/0ebOfesj7KCsGXwbFHAhqGAYZEup/RY9VzBoJhTtxlkPpmkdmg6:sukcT/mxxIFHZhoY9VzBoJp4Vmwa

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Bestellung.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\temp_file.exe
      "C:\Users\Admin\AppData\Local\Temp\temp_file.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\temp_file.exe

    Filesize

    687KB

    MD5

    2031608d4bafa45c4b0bc75d8e807204

    SHA1

    8719b0608a8d814cc81a437e105bafd8622e76d5

    SHA256

    fc73b5466e3c2c0d5d9dc70a8b210eb617ac2fdf74a8caee778d57fdb197690d

    SHA512

    f87ff9056ef512a51d7a162ac6b10aee06e90c753c9d30936d2434e78bb3242f796410981e7bc12ef2a7db4a6841422a8736128dadc07eaf0b8cc3c5a132678c

  • \Users\Admin\AppData\Local\Temp\nso3D12.tmp\System.dll

    Filesize

    12KB

    MD5

    192639861e3dc2dc5c08bb8f8c7260d5

    SHA1

    58d30e460609e22fa0098bc27d928b689ef9af78

    SHA256

    23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6

    SHA512

    6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc

  • memory/2876-22-0x0000000003C00000-0x000000000651F000-memory.dmp

    Filesize

    41.1MB

  • memory/2876-23-0x0000000003C00000-0x000000000651F000-memory.dmp

    Filesize

    41.1MB