Analysis
-
max time kernel
165s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 21:43
Static task
static1
Behavioral task
behavioral1
Sample
4b4d0e3e435b94705cc1d5fc24166adf2c51d5a181a0d68d4ce63ac517f2037c.vbs
Resource
win7-20220414-en
General
-
Target
4b4d0e3e435b94705cc1d5fc24166adf2c51d5a181a0d68d4ce63ac517f2037c.vbs
-
Size
3.0MB
-
MD5
abf6e9892c2de2d0df9dc8a80f7dd4ca
-
SHA1
026493fb163831a7b0678bc51d851dc722d61888
-
SHA256
4b4d0e3e435b94705cc1d5fc24166adf2c51d5a181a0d68d4ce63ac517f2037c
-
SHA512
237df4beefc43d8f2c38c492f2e5223ef3782e42ee47099afeee0fa9a157649899f4533a9dc697a694a6726b55982f934a33cb1167b5255e336c89859b5f366f
Malware Config
Extracted
dridex
23.226.225.152:443
178.128.20.11:3389
198.23.146.216:8443
206.189.112.148:691
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4364 4576 rundll32.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 4896 rundll32.exe 4896 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WScript.exepid process 5048 WScript.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4364 wrote to memory of 4896 4364 rundll32.exe rundll32.exe PID 4364 wrote to memory of 4896 4364 rundll32.exe rundll32.exe PID 4364 wrote to memory of 4896 4364 rundll32.exe rundll32.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4b4d0e3e435b94705cc1d5fc24166adf2c51d5a181a0d68d4ce63ac517f2037c.vbs"1⤵
- Suspicious use of FindShellTrayWindow
PID:5048
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\DUsDQCkXGAzRw.txt, AppInfor1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\DUsDQCkXGAzRw.txt, AppInfor2⤵
- Loads dropped DLL
PID:4896
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD54a1009b9775d256729a097c324a0cb41
SHA11a9f83666b6f08028d08df7dd44b78afbaf712f6
SHA2569476498ec1794a14150880e7da3265f5e21df788617bdf34e99f025c5fae1594
SHA5127869cc93886876638de3d32e560d2c9c4b4ec094f0f3f6a026bb233d167eb0fb6bb3f4cce9b24fbbaf6c0c933eb63a493d9effd94e201815423f915e8f7395fa
-
Filesize
480KB
MD54a1009b9775d256729a097c324a0cb41
SHA11a9f83666b6f08028d08df7dd44b78afbaf712f6
SHA2569476498ec1794a14150880e7da3265f5e21df788617bdf34e99f025c5fae1594
SHA5127869cc93886876638de3d32e560d2c9c4b4ec094f0f3f6a026bb233d167eb0fb6bb3f4cce9b24fbbaf6c0c933eb63a493d9effd94e201815423f915e8f7395fa
-
Filesize
480KB
MD54a1009b9775d256729a097c324a0cb41
SHA11a9f83666b6f08028d08df7dd44b78afbaf712f6
SHA2569476498ec1794a14150880e7da3265f5e21df788617bdf34e99f025c5fae1594
SHA5127869cc93886876638de3d32e560d2c9c4b4ec094f0f3f6a026bb233d167eb0fb6bb3f4cce9b24fbbaf6c0c933eb63a493d9effd94e201815423f915e8f7395fa