Analysis

  • max time kernel
    17s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    25-06-2021 17:58

General

  • Target

    fasdfdf-c622789sb.vbs

  • Size

    8KB

  • MD5

    102b99a1526857fb40dafee9b0f7b7dc

  • SHA1

    a21304e8c5d20e867b9f55b079ad89d4c81e4fe8

  • SHA256

    e0ad1addf863b85a4a3e51794a86f3a665eaa39de8ef9ac9b1a67023fdad6479

  • SHA512

    7f13e29929cd48993a45c4faddd0ad97def49a2b86063cca3a45d2f7c56136001219afab7accf7c93c1b5c106a563a596f65946c762c987c9ffa9d10dc340f14

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fasdfdf-c622789sb.vbs"
    1⤵
    • Blocklisted process makes network request
    PID:900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads