Analysis
-
max time kernel
11s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
01-02-2022 04:10
Static task
static1
Behavioral task
behavioral1
Sample
be73a8b0548f93351984b116d42f6559311fdb6e757dcd174958d8b0028ac1fb.vbs
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
be73a8b0548f93351984b116d42f6559311fdb6e757dcd174958d8b0028ac1fb.vbs
Resource
win10v2004-en-20220113
General
-
Target
be73a8b0548f93351984b116d42f6559311fdb6e757dcd174958d8b0028ac1fb.vbs
-
Size
1.0MB
-
MD5
7e8c741445cde9246b96c96a9cb89cd1
-
SHA1
93409daece5165c0916e4e45d4c62292f57b34db
-
SHA256
be73a8b0548f93351984b116d42f6559311fdb6e757dcd174958d8b0028ac1fb
-
SHA512
6d27fefa6c01fc07cd5d7ea2d69f9a061ac6438327dec2b1474316c0601ed3f7baeeb37b1fcfac0128274bec9d50f27e5006364006f419927de499cd159a411a
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4864 2320 rundll32.exe 82 -
Loads dropped DLL 1 IoCs
pid Process 4300 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4056 WScript.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 4300 4864 rundll32.exe 84 PID 4864 wrote to memory of 4300 4864 rundll32.exe 84 PID 4864 wrote to memory of 4300 4864 rundll32.exe 84
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\be73a8b0548f93351984b116d42f6559311fdb6e757dcd174958d8b0028ac1fb.vbs"1⤵
- Suspicious use of FindShellTrayWindow
PID:4056
-
C:\Windows\system32\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\VrSiekwRtfHPpfg.exe,DllRegisterServer1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\VrSiekwRtfHPpfg.exe,DllRegisterServer2⤵
- Loads dropped DLL
PID:4300
-