Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:26
Static task
static1
Behavioral task
behavioral1
Sample
04a74c23c31d7b5fd1a0a49609def830N.vbs
Resource
win7-20240705-en
windows7-x64
4 signatures
120 seconds
Behavioral task
behavioral2
Sample
04a74c23c31d7b5fd1a0a49609def830N.vbs
Resource
win10v2004-20240730-en
windows10-2004-x64
5 signatures
120 seconds
General
-
Target
04a74c23c31d7b5fd1a0a49609def830N.vbs
-
Size
396B
-
MD5
04a74c23c31d7b5fd1a0a49609def830
-
SHA1
093e312d50d0bb17fee9d85bdba6e8a740bbb422
-
SHA256
f875f9c8b7a5817a26da5c3a72e56f047de2567dee86584cec93fbc5d5180c6a
-
SHA512
aaabec9be7e761b23f4697a7dbe35418f4ec11cb6f8180cc86ae80cea06501f332cbbe5388a39c82a1ac528bc1c94898703ea5f2d5b3c9a1d6c97b834c20f38f
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2772 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2772 PING.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2772 2408 WScript.exe 30 PID 2408 wrote to memory of 2772 2408 WScript.exe 30 PID 2408 wrote to memory of 2772 2408 WScript.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\04a74c23c31d7b5fd1a0a49609def830N.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\System32\PING.EXE"C:\Windows\System32\PING.EXE" -n 1 www.google.com2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2772
-