Analysis
-
max time kernel
89s -
max time network
142s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 22:34
Static task
static1
Behavioral task
behavioral1
Sample
07f5932be35a720a74fc10e7ee6011fa2a8ee4c6df7cf9a6f06bfdc7bd5ec4a1.vbs
Resource
win7-en-20211208
General
-
Target
07f5932be35a720a74fc10e7ee6011fa2a8ee4c6df7cf9a6f06bfdc7bd5ec4a1.vbs
-
Size
22KB
-
MD5
6d5196d8d9cd129b0f257f07ede9e6ab
-
SHA1
14095c55c59db1f8bc00de1781a6641bf2657d65
-
SHA256
07f5932be35a720a74fc10e7ee6011fa2a8ee4c6df7cf9a6f06bfdc7bd5ec4a1
-
SHA512
4dc375ebb0a26d1b92ecad9611098e425b9a02c0bf95bf4271ae88e1a931091ca6ed8f088a728affa2d59935e1243c5ed9263bb059d0fa6609e507e6d1b2f004
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
Processes:
WScript.exeflow pid process 23 2416 WScript.exe 24 2416 WScript.exe 26 2416 WScript.exe 28 2416 WScript.exe 30 2416 WScript.exe 32 2416 WScript.exe 34 2416 WScript.exe -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eoejehjxisk.lnk wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
wscript.exedescription pid process Token: SeShutdownPrivilege 3312 wscript.exe Token: SeShutdownPrivilege 3312 wscript.exe Token: SeShutdownPrivilege 3312 wscript.exe Token: SeShutdownPrivilege 3312 wscript.exe Token: SeShutdownPrivilege 3312 wscript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 2028 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WScript.exedescription pid process target process PID 2416 wrote to memory of 3312 2416 WScript.exe wscript.exe PID 2416 wrote to memory of 3312 2416 WScript.exe wscript.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\07f5932be35a720a74fc10e7ee6011fa2a8ee4c6df7cf9a6f06bfdc7bd5ec4a1.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\System32\wscript.exewscript.exe C:\Users\Admin\AppData\Roaming\eoejehjxisk.vbs2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3ad3055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0be94c88623ca8860b74a78f2b0dfe65
SHA13fffc44f4c268056a8857948dd9951da854230b2
SHA256ae727e3adf412e64c2b5d33ef2f5db7e1061832d4e48d394292c0b520c789f31
SHA512ffe06c53243fd2c667e97c66c05f0c5102d6a6e41fad93deb46c66ebe90a0b7658b0b73f829230bb96d4c16c9105a09820acd9f0b17b94d711af44bd20790b50
-
MD5
0f2af3899589011d686589b9fb21d7ad
SHA1c0867a001666b04596969276ef1add5134b539a6
SHA2561ba7e291e47525be44c5acba05eaecb6c91bcc27f0d59f6c885fbf72bddff37e
SHA5123248fe57380beab295d3c79814886ffb21fe294a4e9cd65f113234b69b199903703c3d5e4c7cbc73febbc29eba17f98c20700f7eb80e6460d586eda9347eb27a