Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 12:44
Static task
static1
Behavioral task
behavioral1
Sample
b3e7c6b6650fcb6335a07cb183c28ef3772a987fdc0238ee2fd1472e2c8a54e0.vbs
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3e7c6b6650fcb6335a07cb183c28ef3772a987fdc0238ee2fd1472e2c8a54e0.vbs
Resource
win10v2004-20220812-en
General
-
Target
b3e7c6b6650fcb6335a07cb183c28ef3772a987fdc0238ee2fd1472e2c8a54e0.vbs
-
Size
13KB
-
MD5
025ee0d5d207b00215da550c233b008a
-
SHA1
c2e766f64c0f3915e0b06b80f1c2d4eeacf678d2
-
SHA256
b3e7c6b6650fcb6335a07cb183c28ef3772a987fdc0238ee2fd1472e2c8a54e0
-
SHA512
409377b8386452980d2c7c7479abdaa2839acbcd019f3f42a1c0b8d9efd3da3612447a0dde8b261efcb688d511493aa9e13d3fc89e96a880f187f97b0fd51447
-
SSDEEP
384:1zzVqiGagRYwZSFFOECXCghDSHXWmZg1r+9f7qN:1zxqagRYwZSGECXCgMmsgV/N
Malware Config
Signatures
-
Drops startup file 2 IoCs
Processes:
WScript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b3e7c6b6650fcb6335a07cb183c28ef3772a987fdc0238ee2fd1472e2c8a54e0.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b3e7c6b6650fcb6335a07cb183c28ef3772a987fdc0238ee2fd1472e2c8a54e0.vbs WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
WScript.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b3e7c6b6650fcb6335a07cb183c28ef3772a987fdc0238ee2fd1472e2c8a54e0 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\b3e7c6b6650fcb6335a07cb183c28ef3772a987fdc0238ee2fd1472e2c8a54e0.vbs\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b3e7c6b6650fcb6335a07cb183c28ef3772a987fdc0238ee2fd1472e2c8a54e0 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\b3e7c6b6650fcb6335a07cb183c28ef3772a987fdc0238ee2fd1472e2c8a54e0.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.