Analysis

  • max time kernel
    107s
  • max time network
    106s
  • platform
    windows7_x64
  • resource
    win7v200217
  • submitted
    02-04-2020 14:24

General

  • Target

    Factura.vbs

  • Size

    44KB

  • MD5

    1de486ee52db1e672d5047dd1b181a85

  • SHA1

    0e564c47de903949684bfd752036878638018388

  • SHA256

    01af757138ece4e2a8d75a0df845ac5c91f152e9429292d6c05dfb77223803ce

  • SHA512

    fbee673a8f7d2b794b281e4c84b54975781bc580b2a673481e87b1060ab5986493b6249efcfdd63830e978e2379ca30934152fce6f1522a30d6b2cd446d2683a

Malware Config

Signatures

  • Blacklisted process makes network request 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Drops startup file 1 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Factura.vbs"
    1⤵
    • Blacklisted process makes network request
    • Modifies system certificate store
    • Drops startup file
    PID:1848

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1848-0-0x00000000026C0000-0x00000000026C4000-memory.dmp
    Filesize

    16KB