Analysis
-
max time kernel
8s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
05-02-2022 16:55
Static task
static1
Behavioral task
behavioral1
Sample
3707ad9488f65a2425dc524d7a496e4458410d31b576348487993272505018f5.vbs
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3707ad9488f65a2425dc524d7a496e4458410d31b576348487993272505018f5.vbs
Resource
win10v2004-en-20220113
General
-
Target
3707ad9488f65a2425dc524d7a496e4458410d31b576348487993272505018f5.vbs
-
Size
1.1MB
-
MD5
88cb1b3a2c58a40c6ecbd2897465337d
-
SHA1
2e866fde78317929b59ed9cf63806116b38a0602
-
SHA256
3707ad9488f65a2425dc524d7a496e4458410d31b576348487993272505018f5
-
SHA512
08450aaefbe3cce898ac8c6dcb5b065b773fdd2b0f66a630711b85d5510f8553f8d19fa6e634d42a6508deb46c10162b2ed74fd3a433f727799a56bbe4cc1bbc
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2460 1968 rundll32.exe 87 -
Loads dropped DLL 1 IoCs
pid Process 396 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1532 WScript.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2460 wrote to memory of 396 2460 rundll32.exe 89 PID 2460 wrote to memory of 396 2460 rundll32.exe 89 PID 2460 wrote to memory of 396 2460 rundll32.exe 89
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3707ad9488f65a2425dc524d7a496e4458410d31b576348487993272505018f5.vbs"1⤵
- Suspicious use of FindShellTrayWindow
PID:1532
-
C:\Windows\system32\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\sRjbEZvCFOESXQJ.exe,DllRegisterServer1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\sRjbEZvCFOESXQJ.exe,DllRegisterServer2⤵
- Loads dropped DLL
PID:396
-