Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 19:10

General

  • Target

    02468574e9bd8bdb16020ec731a3d960c84710155b0e3bf8101d4ec7ca50cffc.vbs

  • Size

    1KB

  • MD5

    5d871b9d3abdb97236098ecd2a6de5fb

  • SHA1

    06a70cae70352b524466d61b2d50a7d24df4d522

  • SHA256

    02468574e9bd8bdb16020ec731a3d960c84710155b0e3bf8101d4ec7ca50cffc

  • SHA512

    9f9b93dc6f608e3eb2e5c2d1092264c387beef9b99a3a92e0d414e320571ed0da3ac62339ff7de3c063e7161cf621e1220c71695fb98b6592875c396434ea789

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 2 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\02468574e9bd8bdb16020ec731a3d960c84710155b0e3bf8101d4ec7ca50cffc.vbs"
    1⤵
    • Deletes itself
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    PID:1864

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Impact

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1864-54-0x000007FEFBF91000-0x000007FEFBF93000-memory.dmp
    Filesize

    8KB