Analysis

  • max time kernel
    44s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    22-01-2021 13:51

General

  • Target

    fhoffa-n11163nkd.vbs

  • Size

    17KB

  • MD5

    8f7bc961047c054ad4f8f6e9efe117c4

  • SHA1

    e0f66c3081be2641a1e8ea6683ff7775ace5313b

  • SHA256

    0b5fc58aedaed72062aaf48471b814e88e6236f7c31b084ec04609836e8ac626

  • SHA512

    62711a889488e8f7d2b1dcbbd2cc68009ae3b8bad71cbdfa546b80654c33a204c4e36398343dd432f305b1a0e64d0f1afab2529ce2c4d973b30e9245bd867de7

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fhoffa-n11163nkd.vbs"
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    PID:336
  • C:\Windows\system32\regsvr32.exe
    regsvr32 -s C:\ProgramData\psamsi.def
    1⤵
    • Process spawned unexpected child process
    PID:1052

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/336-3-0x0000000002660000-0x0000000002664000-memory.dmp
    Filesize

    16KB

  • memory/1052-2-0x000007FEFB571000-0x000007FEFB573000-memory.dmp
    Filesize

    8KB