Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 12:45

General

  • Target

    cd73b80dffa3e40ff86530efb6fc519b11c15e0fbf76f985d92507fcdf8087fb.vbs

  • Size

    13KB

  • MD5

    c53bff0202d414e00cc77b09e00ae253

  • SHA1

    6a4e986e7b934d38f9117c67753e30b1fc8ec459

  • SHA256

    cd73b80dffa3e40ff86530efb6fc519b11c15e0fbf76f985d92507fcdf8087fb

  • SHA512

    6aad5c3e3378d419f4e7e6d5a12c1ac328738b7c798b5a247e8072559a1e185dc377f734b4f09d73d9a56fbf24afb61c6322cb0316af840ef6f7547845a61f61

  • SSDEEP

    384:TzzVqiGagRYwZSFFOECXCghDSHXWmZg1r+9f7qN:TzxqagRYwZSGECXCgMmsgV/N

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cd73b80dffa3e40ff86530efb6fc519b11c15e0fbf76f985d92507fcdf8087fb.vbs"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    PID:1632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1632-54-0x000007FEFBCA1000-0x000007FEFBCA3000-memory.dmp
    Filesize

    8KB