Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 19:29
Static task
static1
Behavioral task
behavioral1
Sample
990982736492bfa0b2a39b0fd05959fa92ca3a282e36977a2523b3fe641a4c34.vbs
Resource
win7-en-20211208
General
-
Target
990982736492bfa0b2a39b0fd05959fa92ca3a282e36977a2523b3fe641a4c34.vbs
-
Size
5KB
-
MD5
75819e8456648b85753f92cbd71ae002
-
SHA1
ad1d61355c974b2eaea1530b367028e4fd8a63c3
-
SHA256
990982736492bfa0b2a39b0fd05959fa92ca3a282e36977a2523b3fe641a4c34
-
SHA512
dd841eebb865c91d6f62d7c1fff664463a5e5ee0ecdc70af5dfd1e9cd88d9a5e59d42a6a89e5452a077a2ff76c7ab324c66858f5d84913934535543ca82e25c6
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
Processes:
WScript.exeflow pid process 24 3340 WScript.exe 26 3340 WScript.exe 28 3340 WScript.exe 30 3340 WScript.exe 32 3340 WScript.exe 34 3340 WScript.exe 36 3340 WScript.exe -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\srzmxqmfmve.lnk wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
wscript.exedescription pid process Token: SeShutdownPrivilege 4320 wscript.exe Token: SeShutdownPrivilege 4320 wscript.exe Token: SeShutdownPrivilege 4320 wscript.exe Token: SeShutdownPrivilege 4320 wscript.exe Token: SeShutdownPrivilege 4320 wscript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 4236 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WScript.exedescription pid process target process PID 3340 wrote to memory of 4320 3340 WScript.exe wscript.exe PID 3340 wrote to memory of 4320 3340 WScript.exe wscript.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\990982736492bfa0b2a39b0fd05959fa92ca3a282e36977a2523b3fe641a4c34.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\System32\wscript.exewscript.exe C:\Users\Admin\AppData\Roaming\srzmxqmfmve.vbs2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3ad2855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4236
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f472ed497a09020dda0570d7a5589806
SHA16689cb9b7bed31011ca5d40cb0948c2c8b5543aa
SHA256add23f164c88b1326f4c261cd63d55f8bccbb51fff366d411e23ad7c820958c1
SHA5121253dbc29a1c1d793a201a696acb0c7fbbeea1b88f3e7baeae9a8dc0ea41151237bb28f10d7d1f8576988603604ca46dfa5fbfc2c4961ad1c5e157e151b6c120
-
MD5
f2ce44d4ddd7beea481f6a8fb85dfcfe
SHA136ffbdb364498a3a082a4a74ea84dd63b78abf97
SHA25623b10e8a8ff5587300773305639986bbc665f365e46342c2e58611822c9d5344
SHA512e789c5f5226cfbd5c45652b7a4fbefba4cda1746863fb9f80b39d92d735f07fd0ad40ff8346b59b0278597ff5b41d4372a45cc8628ad7c9e5f710ac5f17c924f