Analysis

  • max time kernel
    112s
  • max time network
    120s
  • resource
    win7v191014

General

  • Target

    VBS_ae2d789d5592459429702cd490a2bf16.zip

  • Sample

    191122-4s7pjl7t5e

  • SHA256

    ec1c88877b2cc43eb60442e94c46c2e1e100582251e9a545a0ba9df1d5692fa3

Score
N/A

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:860
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1392
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1752
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1980
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1360
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1396
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1784
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1436
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1948
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2008
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1088
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1132
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1836
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1500
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1100
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1580
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1352
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1788
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1424
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1096
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1828
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:316
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1228
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1128
  • C:\Windows\System32\wscript.exe
    "C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\document7806.vbe.vbs ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___- ___-
    1⤵
      PID:1996

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/316-21-0x0000000002920000-0x0000000002924000-memory.dmp

      Filesize

      16KB

    • memory/860-0-0x0000000002970000-0x0000000002974000-memory.dmp

      Filesize

      16KB

    • memory/1088-10-0x0000000002890000-0x0000000002894000-memory.dmp

      Filesize

      16KB

    • memory/1096-19-0x0000000002990000-0x0000000002994000-memory.dmp

      Filesize

      16KB

    • memory/1100-14-0x00000000028F0000-0x00000000028F4000-memory.dmp

      Filesize

      16KB

    • memory/1128-23-0x0000000002980000-0x0000000002984000-memory.dmp

      Filesize

      16KB

    • memory/1132-11-0x0000000002860000-0x0000000002864000-memory.dmp

      Filesize

      16KB

    • memory/1228-22-0x0000000002860000-0x0000000002864000-memory.dmp

      Filesize

      16KB

    • memory/1352-16-0x0000000002860000-0x0000000002864000-memory.dmp

      Filesize

      16KB

    • memory/1360-4-0x0000000002A50000-0x0000000002A54000-memory.dmp

      Filesize

      16KB

    • memory/1392-1-0x0000000002960000-0x0000000002964000-memory.dmp

      Filesize

      16KB

    • memory/1396-5-0x00000000028A0000-0x00000000028A4000-memory.dmp

      Filesize

      16KB

    • memory/1424-18-0x00000000029A0000-0x00000000029A4000-memory.dmp

      Filesize

      16KB

    • memory/1436-7-0x0000000002830000-0x0000000002834000-memory.dmp

      Filesize

      16KB

    • memory/1500-13-0x0000000002990000-0x0000000002994000-memory.dmp

      Filesize

      16KB

    • memory/1580-15-0x00000000027F0000-0x00000000027F4000-memory.dmp

      Filesize

      16KB

    • memory/1752-2-0x00000000027A0000-0x00000000027A4000-memory.dmp

      Filesize

      16KB

    • memory/1784-6-0x00000000029F0000-0x00000000029F4000-memory.dmp

      Filesize

      16KB

    • memory/1788-17-0x00000000028C0000-0x00000000028C4000-memory.dmp

      Filesize

      16KB

    • memory/1828-20-0x0000000002940000-0x0000000002944000-memory.dmp

      Filesize

      16KB

    • memory/1836-12-0x0000000002A40000-0x0000000002A44000-memory.dmp

      Filesize

      16KB

    • memory/1948-8-0x00000000029E0000-0x00000000029E4000-memory.dmp

      Filesize

      16KB

    • memory/1980-3-0x00000000029A0000-0x00000000029A4000-memory.dmp

      Filesize

      16KB

    • memory/2008-9-0x00000000028C0000-0x00000000028C4000-memory.dmp

      Filesize

      16KB