Analysis
-
max time kernel
95s -
max time network
141s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 21:24
Static task
static1
Behavioral task
behavioral1
Sample
418dbcf5f8d5ad7e16a0bb48c1e14cb269bf5bd814f0a70c3aa90ce787136047.vbs
Resource
win7-en-20211208
General
-
Target
418dbcf5f8d5ad7e16a0bb48c1e14cb269bf5bd814f0a70c3aa90ce787136047.vbs
-
Size
13KB
-
MD5
3350e74a4cfa020f9b256194eae25c12
-
SHA1
7f5960ff9feff30d2f4a4c1598dd22632ceea0cb
-
SHA256
418dbcf5f8d5ad7e16a0bb48c1e14cb269bf5bd814f0a70c3aa90ce787136047
-
SHA512
0e880c29ebfd77bfd17713b1fef3f8d6177c6d34d456bf74150d48c6ce9b608fb654410fb724f6e04343abe5716b839c693bca66feb904b49569a11cf696b7fb
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
Processes:
WScript.exeflow pid process 22 2736 WScript.exe 23 2736 WScript.exe 25 2736 WScript.exe 27 2736 WScript.exe 29 2736 WScript.exe 31 2736 WScript.exe 33 2736 WScript.exe -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qoafmsypcua.lnk wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
wscript.exedescription pid process Token: SeShutdownPrivilege 1612 wscript.exe Token: SeShutdownPrivilege 1612 wscript.exe Token: SeShutdownPrivilege 1612 wscript.exe Token: SeShutdownPrivilege 1612 wscript.exe Token: SeShutdownPrivilege 1612 wscript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 2532 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WScript.exedescription pid process target process PID 2736 wrote to memory of 1612 2736 WScript.exe wscript.exe PID 2736 wrote to memory of 1612 2736 WScript.exe wscript.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\418dbcf5f8d5ad7e16a0bb48c1e14cb269bf5bd814f0a70c3aa90ce787136047.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\System32\wscript.exewscript.exe C:\Users\Admin\AppData\Roaming\qoafmsypcua.vbs2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3ad2855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
5f37f928c444b536e3005b156def32e2
SHA1681b66dc5e9cfe6e364759defa33a2e6b31d6c8f
SHA256479f63cadd909231c6bfbda33f5832b04feb9cf1adc0ef9a267c63a6999b5d1d
SHA512e9d8179cd6feba0ebb34399c8e57a67f532dba1d485f4c1e526a691709f6f14ef5453141680c0bf8c6294e5ec2ac963b118b09aaa4286acf4f310737cae32f15
-
MD5
e58b6cd2e3e2e7455ec92850e744a60c
SHA1df1e0a91969a647395a87b278a0665ab5f10ca1b
SHA25615c15c7f2590fbf72fff8cf8ef5783247271acf26e5f7e60f70dce5d78f4d9b9
SHA512b0aa32c80d7cabe8a66675b21dcc10446409fb6835536a9f63c80cfce925ed362a8c2d90cee8acf4200006bd00f914bcd38662144bf4021fa2c66e6f571ba5ed