Analysis
-
max time kernel
17s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 20:18
Static task
static1
Behavioral task
behavioral1
Sample
Transferencia-Bancaria-Comprovativo-24pb-05052020-PDF-1911/Transferencia-Bancaria-Comprovativo-24pb-05052020-PDF-1911.vbs
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Transferencia-Bancaria-Comprovativo-24pb-05052020-PDF-1911/Transferencia-Bancaria-Comprovativo-24pb-05052020-PDF-1911.vbs
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Transferencia-Bancaria-Comprovativo-24pb-05052020-PDF-1911/Transferencia-Bancaria-Comprovativo-24pb-05052020-PDF.pdf
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Transferencia-Bancaria-Comprovativo-24pb-05052020-PDF-1911/Transferencia-Bancaria-Comprovativo-24pb-05052020-PDF.pdf
Resource
win10v2004-20220414-en
General
-
Target
Transferencia-Bancaria-Comprovativo-24pb-05052020-PDF-1911/Transferencia-Bancaria-Comprovativo-24pb-05052020-PDF-1911.vbs
-
Size
22KB
-
MD5
bce58287fd543a394ebc4c866b52a74d
-
SHA1
09ed62c7d881f0c7f8a2a54758dfe6c2ed513388
-
SHA256
aa3d9e85c05f55a26f5e536d0330f35e4fb26d415d10933b4725de1d99eb1463
-
SHA512
71c0e074439ad4089fed20b6a9d8e0a6989db6937a9bf889fe43b16eb637374eccf83607393e7751dba1a216fbd74feba97d8b3cf247261c40c368279484e159
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
WScript.exeflow pid process 4 1964 WScript.exe 6 1964 WScript.exe -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gnybciqxdwc.lnk wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
shutdown.exedescription pid process Token: SeShutdownPrivilege 772 shutdown.exe Token: SeRemoteShutdownPrivilege 772 shutdown.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
WScript.exewscript.execmd.exedescription pid process target process PID 1964 wrote to memory of 796 1964 WScript.exe wscript.exe PID 1964 wrote to memory of 796 1964 WScript.exe wscript.exe PID 1964 wrote to memory of 796 1964 WScript.exe wscript.exe PID 796 wrote to memory of 1384 796 wscript.exe cmd.exe PID 796 wrote to memory of 1384 796 wscript.exe cmd.exe PID 796 wrote to memory of 1384 796 wscript.exe cmd.exe PID 1384 wrote to memory of 772 1384 cmd.exe shutdown.exe PID 1384 wrote to memory of 772 1384 cmd.exe shutdown.exe PID 1384 wrote to memory of 772 1384 cmd.exe shutdown.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Transferencia-Bancaria-Comprovativo-24pb-05052020-PDF-1911\Transferencia-Bancaria-Comprovativo-24pb-05052020-PDF-1911.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\System32\wscript.exewscript.exe C:\Users\Admin\AppData\Roaming\gnybciqxdwc.vbs2⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c shutdown /r /t 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\system32\shutdown.exeshutdown /r /t 0 /f4⤵
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1956
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:864
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD531b3fa3be13c3eca988b6647cf274003
SHA1713779818be4a9956a02f8e16231750a9e0c3eb8
SHA256881aa5538ac02efb941f6cbef4e784f5e4a4a0c70611cc6b7e7e461f21c65f97
SHA512ba1fddaaa64e0bdc2418d615b2a34683167fc336d12109e29574c3cec51a93d16908bf155b96d0d8c4537b185caa7ee29c3eb6a84074ef366cd161b0fe8eb1bf
-
Filesize
691B
MD5895ddb21929f9852a455d6a17cf7efc9
SHA1218b10d5779d81234ee3eebbddddda536e0d84d7
SHA256d02d64869582d2c6366085ca4c9a484fd0567d7eb0a51c286f165b4bffffd383
SHA51235c55b683309d2ef546108b49bef20645e9d7491b426cf44f75c9c70724a2f97e0ab2b23e2cc1bda37d0afe187ec9e69341bc3dd1c55789fa487c77b6ec6cf33