General
-
Target
script.vbs
-
Size
3KB
-
Sample
240726-rkca3awerb
-
MD5
b4a4d52b1434de5f395855770d57964d
-
SHA1
dea23f14fbb3b6e72faa43c44101478051381c29
-
SHA256
e306c4231b9dadf2a7a331a2b116c4be2e37d0f5bf81058af1ce817b27b85ab7
-
SHA512
fddd4c9a3727ff894446d9a7178ebededd7570b9cc2f724019e8ae733c4cf27fb0bf17e3c361b14eabaa60e0fa96d4271db7d89a84ad6b75f8b8a8bf1d915aaf
Static task
static1
Behavioral task
behavioral1
Sample
script.vbs
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
script.vbs
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
script.vbs
-
Size
3KB
-
MD5
b4a4d52b1434de5f395855770d57964d
-
SHA1
dea23f14fbb3b6e72faa43c44101478051381c29
-
SHA256
e306c4231b9dadf2a7a331a2b116c4be2e37d0f5bf81058af1ce817b27b85ab7
-
SHA512
fddd4c9a3727ff894446d9a7178ebededd7570b9cc2f724019e8ae733c4cf27fb0bf17e3c361b14eabaa60e0fa96d4271db7d89a84ad6b75f8b8a8bf1d915aaf
Score9/10-
Renames multiple (134) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Possible privilege escalation attempt
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Modifies file permissions
-