Analysis

  • max time kernel
    170s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2022 23:17

General

  • Target

    3e651804ed8956767e0ae7e2be63a3a0d653ed5500901252ed93e49adb844ddd.vbs

  • Size

    4KB

  • MD5

    7af795a8c3135c602decf335832b46d0

  • SHA1

    05cca16015211b33a7c29f9706fb2a8f4321efda

  • SHA256

    3e651804ed8956767e0ae7e2be63a3a0d653ed5500901252ed93e49adb844ddd

  • SHA512

    563d481249b8f96fb106a15ce6003d845aface6efb79f50782e0c6baf8f2b0a2f3a73cf1d9198c7fe013faaee7802a497c9997b88efcef4ccd4429f642492b4c

  • SSDEEP

    96:pAnTRWvNxntS9ShAdUeH00j/uKpBkMZuwkcvUHA6/o6leFWegh83JP2pUKBf4Z:ETMvb8MOdLfkEYcvHAekegh7pPBQZ

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3e651804ed8956767e0ae7e2be63a3a0d653ed5500901252ed93e49adb844ddd.vbs"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4816
    • C:\Windows\System32\mshta.exe
      mshta.exe
      2⤵
        PID:4668

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4668-132-0x0000000000000000-mapping.dmp