Analysis

  • max time kernel
    39s
  • max time network
    60s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    31-07-2020 08:29

General

  • Target

    746635b2bd985a47943d22332f6c4039.vbs

  • Size

    1.2MB

  • MD5

    746635b2bd985a47943d22332f6c4039

  • SHA1

    a461a1a1031853ba9aa45a0ce4831d5209d40149

  • SHA256

    1bcf9a3648bac8ded65038381f3e40a590d0e2d5ec5d3cc8bca275a2939dad17

  • SHA512

    44682c1533f8b8dd815eeb816421277974474b1f4aa9ab4d4a7635771db80bfcb5a4fe9e6d40c8d67b0b66122f93b1fb33bf9ade6221ca97f70018c34c451fd3

Score
8/10

Malware Config

Signatures

  • Blacklisted process makes network request 1 IoCs
  • Deletes itself 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\746635b2bd985a47943d22332f6c4039.vbs"
    1⤵
    • Blacklisted process makes network request
    • Deletes itself
    • Modifies system certificate store
    PID:1088

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads