Analysis
-
max time kernel
184s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 12:41
Static task
static1
Behavioral task
behavioral1
Sample
1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs
Resource
win10v2004-20221111-en
General
-
Target
1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs
-
Size
13KB
-
MD5
1e60a1b1ddd146f169e5b749554566dc
-
SHA1
7149e3683bab8a2bcd3da05e1a179b92a280089c
-
SHA256
1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2
-
SHA512
9a3424dc7d65261b1aef695cde43c95fbfeb6e5d6fc7fa388044b6acd8c2643049b8bee74dab649132e0ad9eddee5e04ec98ccf800bcfb26cbdd32f87f92ebad
-
SSDEEP
384:tzzVqiGagRYwZSFFOECXCghDSHXWmZg1r+9f7qN:tzxqagRYwZSGECXCgMmsgV/N
Malware Config
Signatures
-
Drops startup file 2 IoCs
Processes:
WScript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
wscript.exeWScript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2 = "wscript.exe //B \"C:\\Users\\Admin\\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2 = "wscript.exe //B \"C:\\Users\\Admin\\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2 = "wscript.exe //B \"C:\\Users\\Admin\\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2 = "wscript.exe //B \"C:\\Users\\Admin\\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\software\microsoft\windows\currentversion\run wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WScript.exedescription pid process target process PID 1676 wrote to memory of 308 1676 WScript.exe wscript.exe PID 1676 wrote to memory of 308 1676 WScript.exe wscript.exe PID 1676 wrote to memory of 308 1676 WScript.exe wscript.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs"2⤵
- Drops startup file
- Adds Run key to start application
PID:308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD51e60a1b1ddd146f169e5b749554566dc
SHA17149e3683bab8a2bcd3da05e1a179b92a280089c
SHA2561f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2
SHA5129a3424dc7d65261b1aef695cde43c95fbfeb6e5d6fc7fa388044b6acd8c2643049b8bee74dab649132e0ad9eddee5e04ec98ccf800bcfb26cbdd32f87f92ebad
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs
Filesize13KB
MD51e60a1b1ddd146f169e5b749554566dc
SHA17149e3683bab8a2bcd3da05e1a179b92a280089c
SHA2561f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2
SHA5129a3424dc7d65261b1aef695cde43c95fbfeb6e5d6fc7fa388044b6acd8c2643049b8bee74dab649132e0ad9eddee5e04ec98ccf800bcfb26cbdd32f87f92ebad