Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
08-02-2023 00:24
Static task
static1
Behavioral task
behavioral1
Sample
install.vbs
Resource
win7-20221111-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
install.vbs
Resource
win10v2004-20221111-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
install.vbs
-
Size
199B
-
MD5
baa56acaee0b5897699a8ba340744eea
-
SHA1
63c32a3f7d0ace96f52ddf84445b18b319c79d26
-
SHA256
072b492a6a95545c6e46fbd8ca0c194173c3437c0cca8eca807c7db103e89d27
-
SHA512
f22e2510b9fae47545ced91e3464121f103a9a3c56c3da1a58719942d4f313f4d7dab2d1a579a29c915b70f6d32b901db83a0e18521ff875e4f4f90fa9825c95
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1644 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1644 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 792 wrote to memory of 1644 792 WScript.exe 28 PID 792 wrote to memory of 1644 792 WScript.exe 28 PID 792 wrote to memory of 1644 792 WScript.exe 28
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass $a='ReadAllText';$T='C:\Users\Public\Music\install.ps1';IEx([IO.File]::$a($T))2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-