Analysis
-
max time kernel
135s -
max time network
115s -
platform
windows7_x64 -
resource
win7v200217 -
submitted
03-03-2020 15:44
Static task
static1
Behavioral task
behavioral1
Sample
MSG_986000.vbs
Resource
win7v200217
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
MSG_986000.vbs
Resource
win10v200217
windows10_x64
0 signatures
0 seconds
General
-
Target
MSG_986000.vbs
-
Size
5.2MB
-
MD5
bb7fbcd342edcef5b43904fe867edc2c
-
SHA1
a6852667b3de27e6d6eb5820fd2d5267479bdffa
-
SHA256
d41c66a9160ce7f0dd0d1360d8b8339a8276fc30215f4623ca88d0efad319346
-
SHA512
2fa2ba7ebf5b624bcd30de80dd49763c1e787cf883ad6ab4a9e5ea286b0a40d4d317b4ba43f5a3e06d869b53f069ce030a793d6a3d7fc0b1e3998a6548253989
Score
10/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
TableOfColors.exeTableOfColors.execiynbw.execiynbw.exeexplorer.exepid process 1576 TableOfColors.exe 1440 TableOfColors.exe 1440 TableOfColors.exe 1604 ciynbw.exe 752 ciynbw.exe 752 ciynbw.exe 1644 explorer.exe 1644 explorer.exe -
Loads dropped DLL 3 IoCs
Processes:
TableOfColors.exepid process 1576 TableOfColors.exe 1576 TableOfColors.exe 1576 TableOfColors.exe -
Blacklisted process makes network request 1 IoCs
Processes:
WScript.exeflow pid process 2 1860 WScript.exe -
Executes dropped EXE 4 IoCs
Processes:
TableOfColors.exeTableOfColors.execiynbw.execiynbw.exepid process 1576 TableOfColors.exe 1440 TableOfColors.exe 1604 ciynbw.exe 752 ciynbw.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
TableOfColors.execiynbw.exedescription pid process target process PID 1576 wrote to memory of 1440 1576 TableOfColors.exe TableOfColors.exe PID 1576 wrote to memory of 1440 1576 TableOfColors.exe TableOfColors.exe PID 1576 wrote to memory of 1440 1576 TableOfColors.exe TableOfColors.exe PID 1576 wrote to memory of 1440 1576 TableOfColors.exe TableOfColors.exe PID 1576 wrote to memory of 1604 1576 TableOfColors.exe ciynbw.exe PID 1576 wrote to memory of 1604 1576 TableOfColors.exe ciynbw.exe PID 1576 wrote to memory of 1604 1576 TableOfColors.exe ciynbw.exe PID 1576 wrote to memory of 1604 1576 TableOfColors.exe ciynbw.exe PID 1576 wrote to memory of 376 1576 TableOfColors.exe schtasks.exe PID 1576 wrote to memory of 376 1576 TableOfColors.exe schtasks.exe PID 1576 wrote to memory of 376 1576 TableOfColors.exe schtasks.exe PID 1576 wrote to memory of 376 1576 TableOfColors.exe schtasks.exe PID 1604 wrote to memory of 752 1604 ciynbw.exe ciynbw.exe PID 1604 wrote to memory of 752 1604 ciynbw.exe ciynbw.exe PID 1604 wrote to memory of 752 1604 ciynbw.exe ciynbw.exe PID 1604 wrote to memory of 752 1604 ciynbw.exe ciynbw.exe PID 1604 wrote to memory of 1644 1604 ciynbw.exe explorer.exe PID 1604 wrote to memory of 1644 1604 ciynbw.exe explorer.exe PID 1604 wrote to memory of 1644 1604 ciynbw.exe explorer.exe PID 1604 wrote to memory of 1644 1604 ciynbw.exe explorer.exe PID 1604 wrote to memory of 1644 1604 ciynbw.exe explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
ciynbw.exepid process 1604 ciynbw.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Adds Run entry to start application 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Windows\CurrentVersion\Run\rrsrvzik = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Cyuujswhia\\ciynbw.exe\"" explorer.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\MSG_986000.vbs"1⤵
- Blacklisted process makes network request
PID:1860
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\TableOfColors.exe"C:\Users\Admin\AppData\Local\Temp\TableOfColors.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Loads dropped DLL
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\TableOfColors.exeC:\Users\Admin\AppData\Local\Temp\TableOfColors.exe /C2⤵
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
PID:1440
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Cyuujswhia\ciynbw.exeC:\Users\Admin\AppData\Roaming\Microsoft\Cyuujswhia\ciynbw.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:1604 -
C:\Users\Admin\AppData\Roaming\Microsoft\Cyuujswhia\ciynbw.exeC:\Users\Admin\AppData\Roaming\Microsoft\Cyuujswhia\ciynbw.exe /C3⤵
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
PID:752
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Adds Run entry to start application
PID:1644
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn jtgbwgrid /tr "\"C:\Users\Admin\AppData\Local\Temp\TableOfColors.exe\" /I jtgbwgrid" /SC ONCE /Z /ST 16:47 /ET 16:592⤵
- Creates scheduled task(s)
PID:376
-