Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 15:12
Static task
static1
Behavioral task
behavioral1
Sample
rekhj.vbe
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
rekhj.vbe
Resource
win10v2004-20240709-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
rekhj.vbe
-
Size
61KB
-
MD5
979a81b2a23c43dfdc1af398d28e2b7d
-
SHA1
06565714ae3125ebded79b5badcf0d2fa4296c69
-
SHA256
17cafad5f4d6c30e537435971b83b834de9abe971f19d176a199268b5a0721ec
-
SHA512
7562e4745e7e2a2903b81be5a6e1277bef12c3e9f958e458b07ff77ad2cbc096fe4d8a0f06e5630a0129091039b2caa75e688b8c5161f6d95b0bd03f507883f6
-
SSDEEP
24:Q0JJJJJJJJJmZZZZZZZZZZZZZZZZZZZZZZZZZZZZ2/////////weeeeeeeeeeeec:UHKp8VWy3SJUJWC+hnwZPnrQ
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2980 ipconfig.exe 2200 ipconfig.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1892 wrote to memory of 1464 1892 WScript.exe 30 PID 1892 wrote to memory of 1464 1892 WScript.exe 30 PID 1892 wrote to memory of 1464 1892 WScript.exe 30 PID 1892 wrote to memory of 2844 1892 WScript.exe 32 PID 1892 wrote to memory of 2844 1892 WScript.exe 32 PID 1892 wrote to memory of 2844 1892 WScript.exe 32 PID 1464 wrote to memory of 2980 1464 cmd.exe 34 PID 1464 wrote to memory of 2980 1464 cmd.exe 34 PID 1464 wrote to memory of 2980 1464 cmd.exe 34 PID 1892 wrote to memory of 2820 1892 WScript.exe 35 PID 1892 wrote to memory of 2820 1892 WScript.exe 35 PID 1892 wrote to memory of 2820 1892 WScript.exe 35 PID 2820 wrote to memory of 2200 2820 cmd.exe 37 PID 2820 wrote to memory of 2200 2820 cmd.exe 37 PID 2820 wrote to memory of 2200 2820 cmd.exe 37
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\rekhj.vbe"1⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\system32\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:2980
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bfxgolaek.dat lxhpicjkgd.mp22⤵PID:2844
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\system32\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:2200
-
-