Analysis
-
max time kernel
94s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23-02-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Advice00000000122876543.vbs
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Payment_Advice00000000122876543.vbs
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
Payment_Advice00000000122876543.vbs
Resource
win10v2004-20240221-en
General
-
Target
Payment_Advice00000000122876543.vbs
-
Size
1KB
-
MD5
c8f7d68cf57960514474ba5ad066dca9
-
SHA1
6863844c1faf768e1e420ffd62fa644a5abe84ba
-
SHA256
b3298c1becc91380b9273146d91ab034b4792e98bf26a7a61e99b481bdf3f4fa
-
SHA512
15fdf858c0155326603ed7a7f18150203d8212e560fffebc9eca03f46a16c0c8e14ab9382c3a0c35d265ab19cbff670b6b148a9e8b47c84bab7fc07a539a261c
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2264 WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 pastebin.com 4 pastebin.com -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)