Analysis

  • max time kernel
    11s
  • max time network
    12s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    01-02-2022 04:10

General

  • Target

    be73a8b0548f93351984b116d42f6559311fdb6e757dcd174958d8b0028ac1fb.vbs

  • Size

    1.0MB

  • MD5

    7e8c741445cde9246b96c96a9cb89cd1

  • SHA1

    93409daece5165c0916e4e45d4c62292f57b34db

  • SHA256

    be73a8b0548f93351984b116d42f6559311fdb6e757dcd174958d8b0028ac1fb

  • SHA512

    6d27fefa6c01fc07cd5d7ea2d69f9a061ac6438327dec2b1474316c0601ed3f7baeeb37b1fcfac0128274bec9d50f27e5006364006f419927de499cd159a411a

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\be73a8b0548f93351984b116d42f6559311fdb6e757dcd174958d8b0028ac1fb.vbs"
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:4056
  • C:\Windows\system32\rundll32.exe
    rundll32 C:\Users\Admin\AppData\Local\Temp\VrSiekwRtfHPpfg.exe,DllRegisterServer
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 C:\Users\Admin\AppData\Local\Temp\VrSiekwRtfHPpfg.exe,DllRegisterServer
      2⤵
      • Loads dropped DLL
      PID:4300

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads