Analysis
-
max time kernel
151s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 11:42
Static task
static1
Behavioral task
behavioral1
Sample
be5d9e5e172e8fffcf7fb8e073d56d4fda6b34d70eb1bef6a2d25c6efa6e5807.vbs
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
be5d9e5e172e8fffcf7fb8e073d56d4fda6b34d70eb1bef6a2d25c6efa6e5807.vbs
Resource
win10v2004-20221111-en
General
-
Target
be5d9e5e172e8fffcf7fb8e073d56d4fda6b34d70eb1bef6a2d25c6efa6e5807.vbs
-
Size
13KB
-
MD5
3c7068403906c45d5ebe7313cfc36c54
-
SHA1
5c8f808595bf1ffa7bd1a0e00ab17b9bf5be88fd
-
SHA256
be5d9e5e172e8fffcf7fb8e073d56d4fda6b34d70eb1bef6a2d25c6efa6e5807
-
SHA512
e42c20eebd5d89da4366ba79d7fcc865ea518537d9327ebafced577729862363170f098eea269f02d79014b60db643d3e6fc105e84dc76794752a56ff38d1f50
-
SSDEEP
384:2zzVqiGagRYwZSFFOECXCghDSHXWmZg1r+9f7qN:2zxqagRYwZSGECXCgMmsgV/N
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\be5d9e5e172e8fffcf7fb8e073d56d4fda6b34d70eb1bef6a2d25c6efa6e5807.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\be5d9e5e172e8fffcf7fb8e073d56d4fda6b34d70eb1bef6a2d25c6efa6e5807.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\be5d9e5e172e8fffcf7fb8e073d56d4fda6b34d70eb1bef6a2d25c6efa6e5807 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\be5d9e5e172e8fffcf7fb8e073d56d4fda6b34d70eb1bef6a2d25c6efa6e5807.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\be5d9e5e172e8fffcf7fb8e073d56d4fda6b34d70eb1bef6a2d25c6efa6e5807 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\be5d9e5e172e8fffcf7fb8e073d56d4fda6b34d70eb1bef6a2d25c6efa6e5807.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.