Analysis

  • max time kernel
    190s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 12:03

General

  • Target

    f49a277d628fca04313f2ba599ce2e823b0e6a90f351a5e5240e78819ae8381c.vbs

  • Size

    146KB

  • MD5

    800e51c2fdc60549c60091bb5a128394

  • SHA1

    1845a0b766505a848c9d509161d43601d2533e0b

  • SHA256

    f49a277d628fca04313f2ba599ce2e823b0e6a90f351a5e5240e78819ae8381c

  • SHA512

    441902d4988bb6100904f0b2fad80691723364779ed86f4d3d1b0c024a98ce165a3254228c5543a09d4ed0ef54b4b9af554c12defdf12f3a0fbc9ac7a43a38a6

  • SSDEEP

    3072:tbNpi9Yku0lZD5jKk1RUgYYC1oPx56uzX:tTfMpxLOgD

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f49a277d628fca04313f2ba599ce2e823b0e6a90f351a5e5240e78819ae8381c.vbs"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    PID:1036

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads