Analysis

  • max time kernel
    11s
  • max time network
    12s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    25-06-2021 17:58

General

  • Target

    fasdfdf-c622789sb.vbs

  • Size

    8KB

  • MD5

    102b99a1526857fb40dafee9b0f7b7dc

  • SHA1

    a21304e8c5d20e867b9f55b079ad89d4c81e4fe8

  • SHA256

    e0ad1addf863b85a4a3e51794a86f3a665eaa39de8ef9ac9b1a67023fdad6479

  • SHA512

    7f13e29929cd48993a45c4faddd0ad97def49a2b86063cca3a45d2f7c56136001219afab7accf7c93c1b5c106a563a596f65946c762c987c9ffa9d10dc340f14

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fasdfdf-c622789sb.vbs"
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    PID:772
  • C:\Windows\system32\regsvr32.exe
    regsvr32 -s C:\ProgramData\data.bin
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\SysWOW64\regsvr32.exe
      -s C:\ProgramData\data.bin
      2⤵
      • Loads dropped DLL
      PID:1720

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\data.bin
    MD5

    7c2c0d0c38ea776a3930e623e08f9578

    SHA1

    f9954ad849c90e43f4dc515207e0e9d2d1522c49

    SHA256

    fe3338e47ce7fb0ca32def1eb015c1ce10e1232c5361db0105ea53327ab35b2d

    SHA512

    bbc114581515fa9a8baa52c2aff990768f81edc2c5a6bd72555d21f039b90524ccd02684d01dd5fa2e048403d9a18943abba5984796137c49e7b1a8c6c54cd77

  • \ProgramData\data.bin
    MD5

    7c2c0d0c38ea776a3930e623e08f9578

    SHA1

    f9954ad849c90e43f4dc515207e0e9d2d1522c49

    SHA256

    fe3338e47ce7fb0ca32def1eb015c1ce10e1232c5361db0105ea53327ab35b2d

    SHA512

    bbc114581515fa9a8baa52c2aff990768f81edc2c5a6bd72555d21f039b90524ccd02684d01dd5fa2e048403d9a18943abba5984796137c49e7b1a8c6c54cd77

  • memory/1680-60-0x000007FEFC181000-0x000007FEFC183000-memory.dmp
    Filesize

    8KB

  • memory/1720-62-0x0000000000000000-mapping.dmp
  • memory/1720-63-0x0000000075EF1000-0x0000000075EF3000-memory.dmp
    Filesize

    8KB