Analysis
-
max time kernel
0s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
1a145faafdc6961da0d9540db41fe2b0.vbs
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1a145faafdc6961da0d9540db41fe2b0.vbs
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
1a145faafdc6961da0d9540db41fe2b0.vbs
-
Size
1KB
-
MD5
1a145faafdc6961da0d9540db41fe2b0
-
SHA1
0ad6ead393034da73f78db8d3f722e41a5f1afc2
-
SHA256
bcf2f359860c6662d56a0d94324df671517223ff150a2db35d1b006dbf205664
-
SHA512
d6420ecf2c62b8f47f3468030bbbe257fe19d72b8095037d5919f9f5b2c5d4d04f959dbb03dbf59e01dcbc98614544a716e1135241eba60c03a5d1b09451bca7
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1312 attrib.exe 2344 attrib.exe 3148 attrib.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1a145faafdc6961da0d9540db41fe2b0.vbs"1⤵PID:1732
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Users\Admin\Desktop\СÓÎÏ·.f2" /P Everyone:R2⤵PID:4656
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Desktop\СÓÎÏ·.f2" /P Everyone:R3⤵PID:3896
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4400
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Users\Admin\Desktop\Internet Exploer.f3" /P Everyone:R2⤵PID:4408
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" "C:\Users\Admin\Desktop\Internet Exploer.f3" +R2⤵
- Views/modifies file attributes
PID:1312
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" "C:\Users\Admin\Desktop\СÓÎÏ·.f2" +R2⤵
- Views/modifies file attributes
PID:2344
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Users\Admin\Desktop\Ìͱ¦Íø.ÌØ¼Û.f1" /P Everyone:R2⤵PID:2984
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" "C:\Users\Admin\Desktop\Ìͱ¦Íø.ÌØ¼Û.f1" +R2⤵
- Views/modifies file attributes
PID:3148
-
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Desktop\Internet Exploer.f3" /P Everyone:R1⤵PID:4788
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"1⤵PID:3120
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Desktop\Ìͱ¦Íø.ÌØ¼Û.f1" /P Everyone:R1⤵PID:2912
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"1⤵PID:1948