Analysis
-
max time kernel
145s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
purchase list #8479734734-8843947347_____________________________.vbe
Resource
win7-20241010-en
General
-
Target
purchase list #8479734734-8843947347_____________________________.vbe
-
Size
24KB
-
MD5
5aea1615d1872e876da66200bc9e47fa
-
SHA1
6fe3576517885705735762ff060e9068fd9fdbe9
-
SHA256
c9a42d3cb9f1ff79d28112275dd9d598daa429c81912c171401fce5594f1f515
-
SHA512
68a87c1bbbf107714634af224b46a02252c8fd7e3799dee8fa36e4e064be07f2e51e4fab20591d7e6e05de769a4aac7ae59ef3b70e95cd3b6cec77d028a05ccd
-
SSDEEP
192:Lh1qAagTqDNmlc1sN+uc4f9caUxarPlP1K:qMqDAlnoP4VcaUxarK
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 796 WScript.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs
Run Powershell and hide display window.
pid Process 2728 powershell.exe 1520 powershell.exe 1356 powershell.exe 2032 powershell.exe 2504 powershell.exe 948 powershell.exe 2932 powershell.exe 1664 powershell.exe 1644 powershell.exe 1196 powershell.exe 2128 powershell.exe 440 powershell.exe 2240 powershell.exe 2536 powershell.exe 2256 powershell.exe 2768 powershell.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2768 powershell.exe 2728 powershell.exe 1196 powershell.exe 2032 powershell.exe 1664 powershell.exe 2128 powershell.exe 2504 powershell.exe 1520 powershell.exe 440 powershell.exe 2240 powershell.exe 2536 powershell.exe 2256 powershell.exe 1356 powershell.exe 1644 powershell.exe 948 powershell.exe 2932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 2768 powershell.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 1196 powershell.exe Token: SeDebugPrivilege 2032 powershell.exe Token: SeDebugPrivilege 1664 powershell.exe Token: SeDebugPrivilege 2128 powershell.exe Token: SeDebugPrivilege 2504 powershell.exe Token: SeDebugPrivilege 1520 powershell.exe Token: SeDebugPrivilege 440 powershell.exe Token: SeDebugPrivilege 2240 powershell.exe Token: SeDebugPrivilege 2536 powershell.exe Token: SeDebugPrivilege 2256 powershell.exe Token: SeDebugPrivilege 1356 powershell.exe Token: SeDebugPrivilege 1644 powershell.exe Token: SeDebugPrivilege 948 powershell.exe Token: SeDebugPrivilege 2932 powershell.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 796 wrote to memory of 2768 796 WScript.exe 31 PID 796 wrote to memory of 2768 796 WScript.exe 31 PID 796 wrote to memory of 2768 796 WScript.exe 31 PID 2104 wrote to memory of 1660 2104 taskeng.exe 33 PID 2104 wrote to memory of 1660 2104 taskeng.exe 33 PID 2104 wrote to memory of 1660 2104 taskeng.exe 33 PID 1660 wrote to memory of 2728 1660 WScript.exe 35 PID 1660 wrote to memory of 2728 1660 WScript.exe 35 PID 1660 wrote to memory of 2728 1660 WScript.exe 35 PID 1660 wrote to memory of 1196 1660 WScript.exe 37 PID 1660 wrote to memory of 1196 1660 WScript.exe 37 PID 1660 wrote to memory of 1196 1660 WScript.exe 37 PID 1660 wrote to memory of 2032 1660 WScript.exe 39 PID 1660 wrote to memory of 2032 1660 WScript.exe 39 PID 1660 wrote to memory of 2032 1660 WScript.exe 39 PID 1660 wrote to memory of 1664 1660 WScript.exe 41 PID 1660 wrote to memory of 1664 1660 WScript.exe 41 PID 1660 wrote to memory of 1664 1660 WScript.exe 41 PID 1660 wrote to memory of 2128 1660 WScript.exe 43 PID 1660 wrote to memory of 2128 1660 WScript.exe 43 PID 1660 wrote to memory of 2128 1660 WScript.exe 43 PID 1660 wrote to memory of 2504 1660 WScript.exe 45 PID 1660 wrote to memory of 2504 1660 WScript.exe 45 PID 1660 wrote to memory of 2504 1660 WScript.exe 45 PID 1660 wrote to memory of 1520 1660 WScript.exe 47 PID 1660 wrote to memory of 1520 1660 WScript.exe 47 PID 1660 wrote to memory of 1520 1660 WScript.exe 47 PID 1660 wrote to memory of 440 1660 WScript.exe 49 PID 1660 wrote to memory of 440 1660 WScript.exe 49 PID 1660 wrote to memory of 440 1660 WScript.exe 49 PID 1660 wrote to memory of 2240 1660 WScript.exe 51 PID 1660 wrote to memory of 2240 1660 WScript.exe 51 PID 1660 wrote to memory of 2240 1660 WScript.exe 51 PID 1660 wrote to memory of 2536 1660 WScript.exe 53 PID 1660 wrote to memory of 2536 1660 WScript.exe 53 PID 1660 wrote to memory of 2536 1660 WScript.exe 53 PID 1660 wrote to memory of 2256 1660 WScript.exe 55 PID 1660 wrote to memory of 2256 1660 WScript.exe 55 PID 1660 wrote to memory of 2256 1660 WScript.exe 55 PID 1660 wrote to memory of 1356 1660 WScript.exe 57 PID 1660 wrote to memory of 1356 1660 WScript.exe 57 PID 1660 wrote to memory of 1356 1660 WScript.exe 57 PID 1660 wrote to memory of 1644 1660 WScript.exe 59 PID 1660 wrote to memory of 1644 1660 WScript.exe 59 PID 1660 wrote to memory of 1644 1660 WScript.exe 59 PID 1660 wrote to memory of 948 1660 WScript.exe 61 PID 1660 wrote to memory of 948 1660 WScript.exe 61 PID 1660 wrote to memory of 948 1660 WScript.exe 61 PID 1660 wrote to memory of 2932 1660 WScript.exe 63 PID 1660 wrote to memory of 2932 1660 WScript.exe 63 PID 1660 wrote to memory of 2932 1660 WScript.exe 63 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\purchase list #8479734734-8843947347_____________________________.vbe"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5A9CC2EA-E027-486C-865E-305388A658F0} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\NforSjIryOoBaoP.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -Command [AppDomain]::CurrentDomain.Load([Convert]::FromBase64String((-join (Get-ItemProperty -LiteralPath 'HKCU:\Software\NforSjIryOoBaoP' -Name 's').s | ForEach-Object {$_[-1..-($_.Length)]}))); [b.b]::b('NforSjIryOoBaoP')3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5f0a3b6b37e95e1aa1a5bab7fc993d6c8
SHA1f7b170c1da17d0575ceb5cc4e4347de2eb883c19
SHA2564b3f3dfb60155db9c08bede4cbaeb91721a4a7c965289fe165855c894c5e79e5
SHA5128d04d5fed95b0fa5907a8ee77cebc30f832f7f25417eeab0d6d7c710a905b7098890a76759baa94b026cf3c945b1820ef0e970791ef8f54075bc92355c9239c3
-
Filesize
2KB
MD5361b0dd2b7993fe7d36caa709dfa9438
SHA1ffd8de4adc4f2850d5b0ae4af21dd2fbd0a75d8d
SHA256ce725c50b0c8b66e12fc51e3673869d069160278a05ac5c4e8c2d278551cf78f
SHA51270537e86d38b45782c6db967bc963c2f09c1fec2c217f58dec21b3e4ea18f1fbf35ed5519a0f3eaf82d87f69ce5bc2c901361fae297d1c0a6bb7ca161d0355a3