Analysis
-
max time kernel
229s -
max time network
347s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 12:45
Static task
static1
Behavioral task
behavioral1
Sample
7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs
Resource
win10v2004-20221111-en
General
-
Target
7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs
-
Size
13KB
-
MD5
6c8939548e0d2ba660b11b54ebb1b113
-
SHA1
09534b0dc6fe36d7c25eb2e25a007727db7868d7
-
SHA256
7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535
-
SHA512
479d1a005db5437393c7b6967c2049697edf6f408aa7496a9bdad42f68cb1f7705f69b66fdc4cb4b73b8881fd38185eccc6ca26008c64abe322d82f0afac7e85
-
SSDEEP
384:PpzzVqiGagRYwZSFFOECXCghDSHXWmZg1r+9f7qN:RzxqagRYwZSGECXCgMmsgV/N
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs wscript.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs\"" WScript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 852 wrote to memory of 1808 852 WScript.exe 28 PID 852 wrote to memory of 1808 852 WScript.exe 28 PID 852 wrote to memory of 1808 852 WScript.exe 28
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs"2⤵
- Drops startup file
- Adds Run key to start application
PID:1808
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD56c8939548e0d2ba660b11b54ebb1b113
SHA109534b0dc6fe36d7c25eb2e25a007727db7868d7
SHA2567e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535
SHA512479d1a005db5437393c7b6967c2049697edf6f408aa7496a9bdad42f68cb1f7705f69b66fdc4cb4b73b8881fd38185eccc6ca26008c64abe322d82f0afac7e85
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535.vbs
Filesize13KB
MD56c8939548e0d2ba660b11b54ebb1b113
SHA109534b0dc6fe36d7c25eb2e25a007727db7868d7
SHA2567e0e10b42fb8094893974f40c6de0d80f8e4f01075178338458ad09e25c8e535
SHA512479d1a005db5437393c7b6967c2049697edf6f408aa7496a9bdad42f68cb1f7705f69b66fdc4cb4b73b8881fd38185eccc6ca26008c64abe322d82f0afac7e85