Analysis

  • max time kernel
    124s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    28-01-2022 20:34

General

  • Target

    643d400cbdcff21ca2c0b8539f6990e22ababc740ced01f466150e44b669edf5.vbs

  • Size

    14KB

  • MD5

    af824991d302e19cfe49a158f5aa7320

  • SHA1

    edd17041aa85f80941f973b4db3506752207920d

  • SHA256

    643d400cbdcff21ca2c0b8539f6990e22ababc740ced01f466150e44b669edf5

  • SHA512

    d06ecfc43d22b13db0982120c551078009c6b9b8adf2de5f4d6b432d1aac5a85766a41b17eb730d1397eb522035ff468efadf1f68ad98833bdcb774f625fec35

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\643d400cbdcff21ca2c0b8539f6990e22ababc740ced01f466150e44b669edf5.vbs"
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    PID:3520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads