Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 17:21
Static task
static1
Behavioral task
behavioral1
Sample
67c7e405ab3003e31c4a5b644018f533.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
67c7e405ab3003e31c4a5b644018f533.vbs
Resource
win10v2004-20240802-en
General
-
Target
67c7e405ab3003e31c4a5b644018f533.vbs
-
Size
7KB
-
MD5
67c7e405ab3003e31c4a5b644018f533
-
SHA1
0fa769646f98dadacb56a1403fbfee7b093a00ad
-
SHA256
2480ce678b0f1dadd044daeadd54b619ae0d85d338d8bb6ec088b90df33e6f9c
-
SHA512
5a79fd9bc7fd609afaabba9ee7f6821c0cdc9a2573ee0f8b7479e922eb58473a8fed71d150084bb66a5b92e302ec7d33894c8a3b522fee1b120d279e9ba66fb2
-
SSDEEP
96:h4D2/N5eIpp/DWL6jFWt2fk2WL2DzGZy9DXW61GY4SXou:qD2/N1nqOhQL2dzTlXWwDZXou
Malware Config
Extracted
metasploit
windows/reverse_tcp
89.197.154.116:7810
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 1 IoCs
pid Process 2440 wFiDrQJMtDm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 388 wrote to memory of 2440 388 WScript.exe 31 PID 388 wrote to memory of 2440 388 WScript.exe 31 PID 388 wrote to memory of 2440 388 WScript.exe 31 PID 388 wrote to memory of 2440 388 WScript.exe 31
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\67c7e405ab3003e31c4a5b644018f533.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\rad38A8E.tmp\wFiDrQJMtDm.exe"C:\Users\Admin\AppData\Local\Temp\rad38A8E.tmp\wFiDrQJMtDm.exe"2⤵
- Executes dropped EXE
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD50b624b2d6c33c81b676919c0832f066d
SHA1c1ae4092a7e46d1a806015db782efbf1f9d8e26c
SHA2565a9beed90e687b7e14e1b923cb5247763d742171bedcd0f60d38013624c89f30
SHA512b74215eac65ca09b9b76db0938638ea7b34397ea161078310f252e1c139ad8b29a2f002171a84b643d0ce9612e74537c73afb0f80d2284b5dc3f72e88b589922