Analysis

  • max time kernel
    41s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-06-2022 22:33

General

  • Target

    8002d87b9e8d6211c4748894cdb039eee927bc5777d3c5db52409e8cbab31715.vbs

  • Size

    11KB

  • MD5

    8681d7bd5c2d5ceff7611cb07ea020c1

  • SHA1

    28827a904d6c9808aa0ba72a1fe2c4a0930ebdf0

  • SHA256

    8002d87b9e8d6211c4748894cdb039eee927bc5777d3c5db52409e8cbab31715

  • SHA512

    b6891de86f450b06e19a76ee6488d61b5af326dc076475c87d64b64c053baca00c4d8a8ad80fe73e67ca032593e49e4c932e4531a619d4bc3262eb9db7d61d4b

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 8 IoCs
  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8002d87b9e8d6211c4748894cdb039eee927bc5777d3c5db52409e8cbab31715.vbs"
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Windows\System32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Roaming\erjajbvbhmf.vbs
      2⤵
      • Drops startup file
      • Suspicious use of WriteProcessMemory
      PID:932
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c shutdown /r /t 0 /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1596
        • C:\Windows\system32\shutdown.exe
          shutdown /r /t 0 /f
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1124
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:636
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1520

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\58193806588649\pavmuegvkorztncbx8010091662405.exe

        Filesize

        299B

        MD5

        a94859dfdf9c825637012e86cd5d73a0

        SHA1

        f0e48f1d3f7ca8f0dc0f920414e0222383b66a46

        SHA256

        90860c3ea70696d607d4bbbc858221658c9ac5a82ce4a848a23576fba55327c8

        SHA512

        fb3a091a193bfeb625f7a07eea9a53083be39a672a53890c5454df96c5be79c338ed2c215e8607e518295eb0a3773b05196170dde681a0f4d7ff5685a4ce87b8

      • C:\Users\Admin\AppData\Roaming\erjajbvbhmf.vbs

        Filesize

        674B

        MD5

        012b4aee4c1852eb0c75a2909353be3d

        SHA1

        2c3df032e2b3534c10219dc707dd178b2717fcb2

        SHA256

        f43fa386754d8bd7babefdc601d796449b425754b83c83aa451dd4eb8cd46a91

        SHA512

        c2dd5a0d4a19ee1a113991c3ab9a76d8add6229b60356299625725e238621037e9c32c3e8154108082d5d13ba0ed2e6d272e406fd399d055c6d30800da3c506e

      • memory/932-55-0x0000000000000000-mapping.dmp

      • memory/1124-60-0x0000000000000000-mapping.dmp

      • memory/1228-54-0x000007FEFB871000-0x000007FEFB873000-memory.dmp

        Filesize

        8KB

      • memory/1596-59-0x0000000000000000-mapping.dmp