Analysis
-
max time kernel
110s -
max time network
159s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 19:27
Static task
static1
Behavioral task
behavioral1
Sample
9a2f575d77cc03afe1230666ed23c1da58dd1644abf02e2487c6cd0db8b2a26d.vbs
Resource
win7-en-20211208
General
-
Target
9a2f575d77cc03afe1230666ed23c1da58dd1644abf02e2487c6cd0db8b2a26d.vbs
-
Size
16KB
-
MD5
2a22f9e6eee207c35229063f75121696
-
SHA1
bdc5d7edcebaaa8508a005943c77cf3fc436542c
-
SHA256
9a2f575d77cc03afe1230666ed23c1da58dd1644abf02e2487c6cd0db8b2a26d
-
SHA512
edad6360a533ffbc4dc91d323109808f45f01070a245555a1a91c62ef142e180c09f61cc92a11a9583cdd6c5a5fd66642d832b14eab20fac77aa0b237a6cce68
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
WScript.exeflow pid process 5 1916 WScript.exe 7 1916 WScript.exe 9 1916 WScript.exe -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cjjeryqfbnb.lnk wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
wscript.exedescription pid process Token: SeShutdownPrivilege 860 wscript.exe Token: SeShutdownPrivilege 860 wscript.exe Token: SeShutdownPrivilege 860 wscript.exe Token: SeShutdownPrivilege 860 wscript.exe Token: SeShutdownPrivilege 860 wscript.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WScript.exedescription pid process target process PID 1916 wrote to memory of 860 1916 WScript.exe wscript.exe PID 1916 wrote to memory of 860 1916 WScript.exe wscript.exe PID 1916 wrote to memory of 860 1916 WScript.exe wscript.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9a2f575d77cc03afe1230666ed23c1da58dd1644abf02e2487c6cd0db8b2a26d.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\System32\wscript.exewscript.exe C:\Users\Admin\AppData\Roaming\cjjeryqfbnb.vbs2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:916
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3097264ff585e23e87cb3ee014a3c6f6
SHA1a8b4cd8071a699d933ca23251cf0e1f8537d9b33
SHA256d9813e788332d81edf7d519f1ca6fe231147e4e597a5e543ac6015196c1a7a53
SHA512c1e6e39323436d0c2a717851307325d96af6dae3bbccbdeff8afca9f5e9cf1a3c32b0162ab0f24c082e8c73bbd15f2a85c6f54b462e9520ad4c739f9f891e835
-
MD5
c4714edd6cdc66e6085a08190c871d2e
SHA1e2d03cf49aabf24eadbdb0faae97fd49f83a9419
SHA25663427c1eef40a65e285e0a4a9889a400197515f9237fd2b8ae4423cb56a7d6ed
SHA512104908a28ed685e887419ea13cb20def61eaaa6cd451baa4c0963375162f8574c38ecbaec944f6994c097de3a7d8455a3d9e2a7dd57f3099293c9338bacc8022