Analysis
-
max time kernel
96s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 19:21
Static task
static1
Behavioral task
behavioral1
Sample
9e77a03223de62be70afe19961ca8d0b88b46c20c834a5bab30ab3334baa2415.vbs
Resource
win7-en-20211208
General
-
Target
9e77a03223de62be70afe19961ca8d0b88b46c20c834a5bab30ab3334baa2415.vbs
-
Size
23KB
-
MD5
d05ff8c51b3cb5ead20b4066a225ab52
-
SHA1
2d9a46deaa6ebae0884c9afd62d7f6bbe7429d50
-
SHA256
9e77a03223de62be70afe19961ca8d0b88b46c20c834a5bab30ab3334baa2415
-
SHA512
5751ad3d68f0a07ca9f4ed1212209712d2ff4a54a59dcc16ef16dec7f6d34484bdd2fc3d430aa4a7399500992a592301b3ed0a40fc5c9c5c15f1140fe73ffc42
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
Processes:
WScript.exeflow pid process 23 2632 WScript.exe 24 2632 WScript.exe 26 2632 WScript.exe 28 2632 WScript.exe 30 2632 WScript.exe 32 2632 WScript.exe 34 2632 WScript.exe -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rtrtiyxsqlg.lnk wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
wscript.exedescription pid process Token: SeShutdownPrivilege 1396 wscript.exe Token: SeShutdownPrivilege 1396 wscript.exe Token: SeShutdownPrivilege 1396 wscript.exe Token: SeShutdownPrivilege 1396 wscript.exe Token: SeShutdownPrivilege 1396 wscript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 1088 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WScript.exedescription pid process target process PID 2632 wrote to memory of 1396 2632 WScript.exe wscript.exe PID 2632 wrote to memory of 1396 2632 WScript.exe wscript.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9e77a03223de62be70afe19961ca8d0b88b46c20c834a5bab30ab3334baa2415.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\System32\wscript.exewscript.exe C:\Users\Admin\AppData\Roaming\rtrtiyxsqlg.vbs2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3ad2855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3b6e6c182436db8a2bfc39a3ef3c5b2d
SHA1b62b5d9e6aec829af07af097326d098d28a45d6d
SHA2567e478cab4281f69316b8e9407f132d19a9af9f3676c5ded5f80ea8cabcabbbea
SHA5120f9fe65c3fefd5e402430f14b6b28880007225df642ecafdd4fccdca0cf44fae29034930d9a36bd510b0ec8b80ef073ec764746f5bec803353c57bb23b5d7f9a
-
MD5
012462c32e222b7f1922ffcd40e06877
SHA1eb4d9d15de2f4d0cdfede665f4ab7a5b6662893e
SHA2564a5f490e5664cb9bbb549ee9a88c07ba0d0cf7e538529b739fa003ec9f21c15d
SHA5129eb1243059d5baa48f78049ce58ef2f6f87fbd88e53bebdcd14eaca53f45b272f96ec43f6a79422ee0b946810a72231f10c4835122e2bc5b3d2c8774c010a388