Analysis
-
max time kernel
93s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 17:32
Behavioral task
behavioral1
Sample
+.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
+.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Archive.688306047.vbs
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Archive.688306047.vbs
Resource
win10v2004-20230220-en
General
-
Target
Archive.688306047.vbs
-
Size
8KB
-
MD5
dfd1724a4e51522d244d96dd58dcd721
-
SHA1
c8affb1a38d2bebaaf5c91aec4c23f2337533fe8
-
SHA256
1111e97e61ee666ad9df5a3fe14b37eeb02355c557c2998eb220bc165c0f6f1d
-
SHA512
f086dd7609b6bca84ce4db9d547eca9b554bb8582b9004eca0797bf4f50a81414c73d10d59e752cc44db723c13ace1e8e600bcc9bb43d48a62e0e419ea121101
-
SSDEEP
96:ehSF2h2qFlO5E8WDxSAC9H0pmJdy0xjK8rq9yZ9z0tsCNNM:dFIt3XcH0pSHrq9yZ9z/CNNM
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2488 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings WScript.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 5 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Archive.688306047.vbs"1⤵
- Blocklisted process makes network request
- Modifies registry class
PID:2488
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2448