Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
FL-674681.vbs
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
FL-674681.vbs
Resource
win10v2004-20230915-en
4 signatures
150 seconds
General
-
Target
FL-674681.vbs
-
Size
3KB
-
MD5
cab106d7952a5c11aef886e3f6f692b3
-
SHA1
9e0e0fab2abb794571ea9bd6b57e5daca3908ff7
-
SHA256
f114827bc079cf5a923f7e3ad74ef399aedf0225d23ea7039a3dd68866664340
-
SHA512
6f1f0b79ac0d5b1c7cf339eede9c4c22c63d6673e83bff040827cb09d94083dbb86898442c474bdf713de2fdda98fac7c893ab7d520cd6c8edb0c1c7c1561993
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 4 2464 WScript.exe 6 2464 WScript.exe 7 2464 WScript.exe 8 2464 WScript.exe 9 2464 WScript.exe 11 2464 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2360 2464 WScript.exe 28 PID 2464 wrote to memory of 2360 2464 WScript.exe 28 PID 2464 wrote to memory of 2360 2464 WScript.exe 28
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\FL-674681.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c call "C:\Users\Admin\AppData\Local\Temp\CxmWrBPhdmn.exe"2⤵PID:2360
-