Analysis
-
max time kernel
52s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23-03-2023 17:53
Static task
static1
Behavioral task
behavioral1
Sample
de53c5ea5dee3fcc8b6a9f8a6926aa84d1434408e968205f0e8ef94250c8f3a8.vbs
Resource
win10-20230220-en
General
-
Target
de53c5ea5dee3fcc8b6a9f8a6926aa84d1434408e968205f0e8ef94250c8f3a8.vbs
-
Size
93KB
-
MD5
4452f951ec5390c7cd0397d659717b4d
-
SHA1
1ddf3284b015fb3e7dba3157ba6c81511a9c9402
-
SHA256
de53c5ea5dee3fcc8b6a9f8a6926aa84d1434408e968205f0e8ef94250c8f3a8
-
SHA512
9f72c23a9975d1745b97a8b454695ffd6272410acb9d71ec7e1c5d479cfce6deb09aecd2f3cc49ed1c5307d0f5be788498e9c01876cbfc2b2255c38ff4b549bd
-
SSDEEP
1536:fh7OdS2cokRMkxS8qDAHfhhBqrHBsNZqHqbuh7jGMkVh7Ufqjx3RFtDGXo6BICuQ:fh7OdS2cokRMkxS8qDAHJhorHBsNZqHB
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
Processes:
wscript.exeflow pid process 2 2600 wscript.exe 4 2600 wscript.exe 6 2600 wscript.exe 8 2600 wscript.exe 10 2600 wscript.exe 12 2600 wscript.exe 14 2600 wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 7 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 10 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 12 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 14 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 6 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 8 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WScript.exedescription pid process target process PID 3436 wrote to memory of 2600 3436 WScript.exe wscript.exe PID 3436 wrote to memory of 2600 3436 WScript.exe wscript.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\de53c5ea5dee3fcc8b6a9f8a6926aa84d1434408e968205f0e8ef94250c8f3a8.vbs"
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //E:vbscript C:\Users\Admin\AppData\Local\Temp\radCA54FDA02darrad09F3E6174dar.txt
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Downloads
-
C:\Users\Admin\AppData\Local\Temp\radCA54FDA02darrad09F3E6174dar.txtFilesize
63KB
MD5384b4dde80c6f5394f440b6951da895b
SHA1585664d227f8aac1a367e8630f15cedafd1de131
SHA256bdb582b55ecd8f46bd0795e7acc9c6c2fe8f2f871f617be0804becb8ed789c50
SHA5126f7f3d76e54f1cc900a914be8ea82050fda02a054f3df6c8b4bb19a3519aa8ac6098c4790d893854615b47c60e2e9b183e076a3a909c6b1cc5c1d35012d526e5
-
C:\Users\Admin\AppData\Local\Temp\radF627B.tmp.zipFilesize
10B
MD57605968e79d0ca095ab1231486d2b814
SHA1a007b420d19ceefa840f0373e050e3b51a4ab480
SHA256493fda53120050f85836032324409be6c6484f90a0755ae0c6a673ba7626818b
SHA512769249da7ed6c6bf5671bbc2371a6453b433226ceb8c4c2aa3604000d66647bcec83dee1ab64c0262fa40f923d77e23bad2c47274d339effc51d904ce77072a6