Analysis
-
max time kernel
61s -
max time network
182s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 06:16
Static task
static1
Behavioral task
behavioral1
Sample
6be47a0e90c156e136a72dd94af8d0217fb4152c0dc6171702ceaa306d62e857.vbs
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6be47a0e90c156e136a72dd94af8d0217fb4152c0dc6171702ceaa306d62e857.vbs
Resource
win10v2004-20220414-en
General
-
Target
6be47a0e90c156e136a72dd94af8d0217fb4152c0dc6171702ceaa306d62e857.vbs
-
Size
24KB
-
MD5
c66f748e72e6070e0e7a99f1e9b3e29c
-
SHA1
5f1342f7d84032945cb2cfc0935e2c0a1229d3e8
-
SHA256
6be47a0e90c156e136a72dd94af8d0217fb4152c0dc6171702ceaa306d62e857
-
SHA512
153ccaf14b33c62be399db5e05463914b7361ed077f80c821d348639f11c6fa228aa31dda6e7ed9064c63f23715bb28190f92dc838de3a969cf5f9a03b3ab10e
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
WScript.exeflow pid process 5 1664 WScript.exe 6 1664 WScript.exe 8 1664 WScript.exe -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zhthhesutzw.lnk wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
shutdown.exedescription pid process Token: SeShutdownPrivilege 1424 shutdown.exe Token: SeRemoteShutdownPrivilege 1424 shutdown.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
WScript.exewscript.execmd.exedescription pid process target process PID 1664 wrote to memory of 684 1664 WScript.exe wscript.exe PID 1664 wrote to memory of 684 1664 WScript.exe wscript.exe PID 1664 wrote to memory of 684 1664 WScript.exe wscript.exe PID 684 wrote to memory of 1892 684 wscript.exe cmd.exe PID 684 wrote to memory of 1892 684 wscript.exe cmd.exe PID 684 wrote to memory of 1892 684 wscript.exe cmd.exe PID 1892 wrote to memory of 1424 1892 cmd.exe shutdown.exe PID 1892 wrote to memory of 1424 1892 cmd.exe shutdown.exe PID 1892 wrote to memory of 1424 1892 cmd.exe shutdown.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6be47a0e90c156e136a72dd94af8d0217fb4152c0dc6171702ceaa306d62e857.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\System32\wscript.exewscript.exe C:\Users\Admin\AppData\Roaming\zhthhesutzw.vbs2⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c shutdown /r /t 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\system32\shutdown.exeshutdown /r /t 0 /f4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1880
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD531b3fa3be13c3eca988b6647cf274003
SHA1713779818be4a9956a02f8e16231750a9e0c3eb8
SHA256881aa5538ac02efb941f6cbef4e784f5e4a4a0c70611cc6b7e7e461f21c65f97
SHA512ba1fddaaa64e0bdc2418d615b2a34683167fc336d12109e29574c3cec51a93d16908bf155b96d0d8c4537b185caa7ee29c3eb6a84074ef366cd161b0fe8eb1bf
-
Filesize
499B
MD5c53adaceab9f41e2fc282263a481be2b
SHA1c72c4cda843fd862573741d139e18abfe70758ac
SHA2563d336e7606901a21970ee663cf151b04f47a1da346073be5531e30f4b9fc6af8
SHA512fc8144041a856593b9bc6a452abef68cf8f3fca2e2753bef33d8be017b616763cbe97bd74ceadfc01bc0d3412bba9bf658007cf566c79d2237d91d49e5b0150a