Analysis

  • max time kernel
    229s
  • max time network
    347s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 12:45

General

  • Target

    7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs

  • Size

    13KB

  • MD5

    6c8939548e0d2ba660b11b54ebb1b113

  • SHA1

    09534b0dc6fe36d7c25eb2e25a007727db7868d7

  • SHA256

    7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535

  • SHA512

    479d1a005db5437393c7b6967c2049697edf6f408aa7496a9bdad42f68cb1f7705f69b66fdc4cb4b73b8881fd38185eccc6ca26008c64abe322d82f0afac7e85

  • SSDEEP

    384:PpzzVqiGagRYwZSFFOECXCghDSHXWmZg1r+9f7qN:RzxqagRYwZSGECXCgMmsgV/N

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      PID:1808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs

    Filesize

    13KB

    MD5

    6c8939548e0d2ba660b11b54ebb1b113

    SHA1

    09534b0dc6fe36d7c25eb2e25a007727db7868d7

    SHA256

    7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535

    SHA512

    479d1a005db5437393c7b6967c2049697edf6f408aa7496a9bdad42f68cb1f7705f69b66fdc4cb4b73b8881fd38185eccc6ca26008c64abe322d82f0afac7e85

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs

    Filesize

    13KB

    MD5

    6c8939548e0d2ba660b11b54ebb1b113

    SHA1

    09534b0dc6fe36d7c25eb2e25a007727db7868d7

    SHA256

    7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535

    SHA512

    479d1a005db5437393c7b6967c2049697edf6f408aa7496a9bdad42f68cb1f7705f69b66fdc4cb4b73b8881fd38185eccc6ca26008c64abe322d82f0afac7e85

  • memory/852-54-0x000007FEFBFD1000-0x000007FEFBFD3000-memory.dmp

    Filesize

    8KB