Analysis
-
max time kernel
13s -
max time network
103s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
29-11-2020 23:24
Static task
static1
Behavioral task
behavioral1
Sample
22VVBN0D55D8GF7000DS1S4S8A5.vbs
Resource
win10v20201028
Behavioral task
behavioral2
Sample
~.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
22VVBN0D55D8GF7000DS1S4S8A5.vbs
Resource
win7v20201028
Behavioral task
behavioral4
Sample
~.exe
Resource
win7v20201028
General
-
Target
22VVBN0D55D8GF7000DS1S4S8A5.vbs
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
WScript.exeflow pid process 6 5004 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings WScript.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WScript.exedescription pid process target process PID 4804 wrote to memory of 5004 4804 WScript.exe WScript.exe PID 4804 wrote to memory of 5004 4804 WScript.exe WScript.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\22VVBN0D55D8GF7000DS1S4S8A5.vbs"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\E69.vbs"2⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\E69.vbsMD5
acf4e26d5fa1883fb7f851aa9eee8a56
SHA101fcfecd96b50823f247f6de0efcecb5ace304a8
SHA2569402ff9c33fccb25615d69c04a1982498054266b2d20173d5df47643f1bf720d
SHA51265f91dc79519dfd34bc73a34755eaa0547a10eec6b1b56b275559e9f6b640f42a0d492985b0c5c62e5d97935d61bf035e4f784f29a35ef83bd0d2de0ed63c8ac
-
memory/5004-2-0x0000000000000000-mapping.dmp