Analysis

  • max time kernel
    150s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 12:44

General

  • Target

    fcfe225907bea80d5f79c4c14fc308d1f0ea3cfdc5787a6612b1659bd183d15f.vbs

  • Size

    13KB

  • MD5

    5e85e7b008985337fe6e8466ce17aa20

  • SHA1

    bf958051f89193ec06fe1af85a93642d66404e6b

  • SHA256

    fcfe225907bea80d5f79c4c14fc308d1f0ea3cfdc5787a6612b1659bd183d15f

  • SHA512

    ee4c3117e47d8f290fb8c563d8ee623457386f7730ee132e63bd95e6af80d67c2944c4d0f1125dacab5d10ffcee8a4bc75ce6e33d707f6b4aff3bfc1e84303f9

  • SSDEEP

    384:+zzVqiGagRYwZSFFOECXCghDSHXWmZg1r+9f7qN:+zxqagRYwZSGECXCgMmsgV/N

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fcfe225907bea80d5f79c4c14fc308d1f0ea3cfdc5787a6612b1659bd183d15f.vbs"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    PID:5036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads