Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10_x64 -
resource
win10v200217 -
submitted
02-04-2020 14:24
Static task
static1
Behavioral task
behavioral1
Sample
Factura.vbs
Resource
win7v200217
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Factura.vbs
Resource
win10v200217
windows10_x64
0 signatures
0 seconds
General
-
Target
Factura.vbs
-
Size
44KB
-
MD5
1de486ee52db1e672d5047dd1b181a85
-
SHA1
0e564c47de903949684bfd752036878638018388
-
SHA256
01af757138ece4e2a8d75a0df845ac5c91f152e9429292d6c05dfb77223803ce
-
SHA512
fbee673a8f7d2b794b281e4c84b54975781bc580b2a673481e87b1060ab5986493b6249efcfdd63830e978e2379ca30934152fce6f1522a30d6b2cd446d2683a
Score
8/10
Malware Config
Signatures
-
Blacklisted process makes network request 6 IoCs
Processes:
WScript.exeflow pid process 3 4024 WScript.exe 5 4024 WScript.exe 7 4024 WScript.exe 9 4024 WScript.exe 11 4024 WScript.exe 12 4024 WScript.exe -
Drops startup file 1 IoCs
Processes:
WScript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\H24SVB2Z.lnk WScript.exe -
Modifies registry class 1 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance WScript.exe