Analysis
-
max time kernel
188s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 12:41
Static task
static1
Behavioral task
behavioral1
Sample
1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs
Resource
win10v2004-20221111-en
General
-
Target
1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs
-
Size
13KB
-
MD5
1e60a1b1ddd146f169e5b749554566dc
-
SHA1
7149e3683bab8a2bcd3da05e1a179b92a280089c
-
SHA256
1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2
-
SHA512
9a3424dc7d65261b1aef695cde43c95fbfeb6e5d6fc7fa388044b6acd8c2643049b8bee74dab649132e0ad9eddee5e04ec98ccf800bcfb26cbdd32f87f92ebad
-
SSDEEP
384:tzzVqiGagRYwZSFFOECXCghDSHXWmZg1r+9f7qN:tzxqagRYwZSGECXCgMmsgV/N
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
Processes:
WScript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
WScript.exewscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2 = "wscript.exe //B \"C:\\Users\\Admin\\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2 = "wscript.exe //B \"C:\\Users\\Admin\\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2 = "wscript.exe //B \"C:\\Users\\Admin\\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2 = "wscript.exe //B \"C:\\Users\\Admin\\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\software\microsoft\windows\currentversion\run WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WScript.exedescription pid process target process PID 4424 wrote to memory of 1052 4424 WScript.exe wscript.exe PID 4424 wrote to memory of 1052 4424 WScript.exe wscript.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs"2⤵
- Drops startup file
- Adds Run key to start application
PID:1052
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD51e60a1b1ddd146f169e5b749554566dc
SHA17149e3683bab8a2bcd3da05e1a179b92a280089c
SHA2561f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2
SHA5129a3424dc7d65261b1aef695cde43c95fbfeb6e5d6fc7fa388044b6acd8c2643049b8bee74dab649132e0ad9eddee5e04ec98ccf800bcfb26cbdd32f87f92ebad
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2.vbs
Filesize13KB
MD51e60a1b1ddd146f169e5b749554566dc
SHA17149e3683bab8a2bcd3da05e1a179b92a280089c
SHA2561f00035aa6dbba3e9a6b7dfb7ae781ea6edaa2580d97b586c3beff9755be8db2
SHA5129a3424dc7d65261b1aef695cde43c95fbfeb6e5d6fc7fa388044b6acd8c2643049b8bee74dab649132e0ad9eddee5e04ec98ccf800bcfb26cbdd32f87f92ebad