Analysis
-
max time kernel
13s -
max time network
79s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22-03-2023 22:53
Static task
static1
Behavioral task
behavioral1
Sample
file_1.vbs
Resource
win10-20230220-en
General
-
Target
file_1.vbs
-
Size
89KB
-
MD5
7559f0ff4f7e58ed031fe0b4438f4c57
-
SHA1
e2225573a8877c057319e10029fd85b0a51375a8
-
SHA256
73527befbcc1ec6716003fc875d578c40e3dfe619349ff288008bab33c90e5d2
-
SHA512
252d0a52c3b7bca5ea56a14c7ad1e27967b03e3dccfc3b8d79b8e1c474ed625937719af314e74f62583c708b45b937091e8fae7f1e40e56bf261d0f839f94e4a
-
SSDEEP
384:6/EHPbchpdLrwUkRI8K5mAX3E53EnoUyd4989GgFWfYyLxgaHxixxOD/n3FiSf+y:6/EKr9ka8yZrgGayLpbng5s6n96
Malware Config
Extracted
emotet
Epoch4
213.239.212.5:443
129.232.188.93:443
103.43.75.120:443
197.242.150.244:8080
1.234.2.232:8080
110.232.117.186:8080
95.217.221.146:8080
159.89.202.34:443
159.65.88.10:8080
82.223.21.224:8080
169.57.156.166:8080
45.176.232.124:443
45.235.8.30:8080
173.212.193.249:8080
107.170.39.149:8080
119.59.103.152:8080
167.172.199.165:8080
91.207.28.33:8080
185.4.135.165:8080
104.168.155.143:8080
206.189.28.199:8080
79.137.35.198:8080
103.132.242.26:8080
202.129.205.3:8080
103.75.201.2:443
149.56.131.28:8080
5.135.159.50:443
172.105.226.75:8080
201.94.166.162:443
115.68.227.76:8080
164.90.222.65:443
186.194.240.217:443
153.126.146.25:7080
187.63.160.88:80
209.126.85.32:8080
72.15.201.15:8080
153.92.5.27:8080
167.172.253.162:8080
147.139.166.154:8080
163.44.196.120:8080
183.111.227.137:8080
139.59.126.41:443
164.68.99.3:8080
188.44.20.25:443
94.23.45.86:4143
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
wscript.exeflow pid process 2 4048 wscript.exe 4 4048 wscript.exe 7 4048 wscript.exe 11 4048 wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 7 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 11 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WScript.exedescription pid process target process PID 3236 wrote to memory of 4048 3236 WScript.exe wscript.exe PID 3236 wrote to memory of 4048 3236 WScript.exe wscript.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\file_1.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //E:vbscript C:\Users\Admin\AppData\Local\Temp\rad2C67509D6darradE33979389dar.txt2⤵
- Blocklisted process makes network request
PID:4048 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" "C:\Users\Admin\AppData\Local\Temp\radC9A2CBF19dar\m6A4G4mav3qAukWqvhxcGCsmjysFYbEeM.dll"3⤵PID:4340
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\QsJSFTkhiej\vPbrZ.dll"4⤵PID:4136
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
946KB
MD57ca680ec35e07dd962b8c96b4545463f
SHA119b4eb46bd9ba53c21fbfc87480693a2d7c05a8c
SHA256c6b793d39f46f12aa90792b3d494c7b275dee962101f42d9096d7b2daf64e1e5
SHA512628f74c8f109dbe40977b1b40a65b6a47f8bf6f95bfa3dbae4626c33b9c57cb8ebc8c4534275c304ec91f988f7f27ccc84c953d61f55291a61ab555c10997ead
-
Filesize
61KB
MD5958eb4fa0bfca295216cd6027977fcb8
SHA10bc88fb4229a73152b2c33750dd5b5be52fcf287
SHA2569b32ca5d8a34ae2351bc68500fb6929468c42d0ddda53fba5676410beab6d498
SHA5124e4e2d84ce82eaa222180e86a2feaa7fdb19108d227ca922c69d30e30ef1ed463c41d540c25f604edd04be86f8490ae8570d2b67a97e0f9f45d048954d32787f
-
Filesize
501.7MB
MD51c019e68db71c477f1e4a56b67dac7f7
SHA123e2ab5049700ab89a2cca482983e0c029ee95cf
SHA256e202745c18ab4dfa3bbbef398f3fd418ae3607ac6e6c7ad447340d230709bdbc
SHA512ac51733050b83621b8904aec34fad25fb0144b208eae58956e981e6588fd87b40b6a97b2cb46642fb388a41b33141501dcce3fb58dba4b99749ac823b897edcd
-
Filesize
502.1MB
MD5c93a7d9276f2d5b2b17a10245e1bd960
SHA10e6cd74636db9a136006a4df93140fc7f95f27bf
SHA2567431455afafb22a5451f7b5734dfb1b08c9b794bd8bb45a5afe9a304f05e5800
SHA512e83b37e9c54a2832575260315e38b2f6390a43d9a7cdf777eb13784728a7bbfb3a5a4d31b63aba19417042eb32fdb88307520ee0728252e33ff84e32412a5754