Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 09:02
Static task
static1
Behavioral task
behavioral1
Sample
d0eacc86ba243aa25112dfdbe4c11b1bc7e90a50921e2dccaefa65e626484a1c.vbs
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d0eacc86ba243aa25112dfdbe4c11b1bc7e90a50921e2dccaefa65e626484a1c.vbs
Resource
win10v2004-en-20220113
General
-
Target
d0eacc86ba243aa25112dfdbe4c11b1bc7e90a50921e2dccaefa65e626484a1c.vbs
-
Size
160KB
-
MD5
2f4b0aaefc5a69aad3be2795c45e97d7
-
SHA1
b40b2a3afad0f04934e3892a23fa320fbbe85ec5
-
SHA256
d0eacc86ba243aa25112dfdbe4c11b1bc7e90a50921e2dccaefa65e626484a1c
-
SHA512
4e5113ad23bc3a1242f47d9d03a319bd921e3016a8527637aabbb390045f7559609cd478dad8500745a457636360822de5d9f51f2a11e6a13ed76b44d8ad3b8a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1324 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1324 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WScript.exedescription pid process target process PID 1740 wrote to memory of 1324 1740 WScript.exe powershell.exe PID 1740 wrote to memory of 1324 1740 WScript.exe powershell.exe PID 1740 wrote to memory of 1324 1740 WScript.exe powershell.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d0eacc86ba243aa25112dfdbe4c11b1bc7e90a50921e2dccaefa65e626484a1c.vbs"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eXEcUTiONpOLicY rEmOtEsIgNeD -FILE C:\Users\Admin\AppData\Local\Temp\OS64Bits.PS12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\OS64Bits.PS1MD5
71d07a62e6a9f93697bee333cf33cb43
SHA1314e0556f14615f249e76c399fbd352a57c8b854
SHA25628551c51fc1cb17cfe2f238acc467e8264a01c8262911250634be617a9e16b91
SHA512e0dcee489be5c9d73adf7bd373dc5d998bd0be8e1d51857081d8764278e73433ba5f0885a2492b9fdcd7bccc4d7c83e9e5c3316f1b19c80dca413913ad82555e
-
memory/1324-56-0x000007FEF56DE000-0x000007FEF56DF000-memory.dmpFilesize
4KB
-
memory/1324-59-0x00000000026C0000-0x00000000026C2000-memory.dmpFilesize
8KB
-
memory/1324-58-0x00000000026C2000-0x00000000026C4000-memory.dmpFilesize
8KB
-
memory/1324-60-0x00000000026C4000-0x00000000026C7000-memory.dmpFilesize
12KB
-
memory/1324-57-0x000007FEF2FB0000-0x000007FEF3B0D000-memory.dmpFilesize
11.4MB
-
memory/1324-61-0x000000001B7E0000-0x000000001BADF000-memory.dmpFilesize
3.0MB
-
memory/1324-63-0x00000000026CB000-0x00000000026EA000-memory.dmpFilesize
124KB
-
memory/1740-54-0x000007FEFBEE1000-0x000007FEFBEE3000-memory.dmpFilesize
8KB