Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
29a2f380dca14716c3e3c53da12df3d0b1fb5c3efd0d2b711d3de523a7273836.vbs
Resource
win7-20240903-en
General
-
Target
29a2f380dca14716c3e3c53da12df3d0b1fb5c3efd0d2b711d3de523a7273836.vbs
-
Size
4.4MB
-
MD5
afaefcfba4a6f5052383156ce7f88efd
-
SHA1
ac99a4ba88364136174b70b226881297144de96e
-
SHA256
29a2f380dca14716c3e3c53da12df3d0b1fb5c3efd0d2b711d3de523a7273836
-
SHA512
4fdb773189b885e11ce669b711c04777d8b29ab4a409e2a470fb13b37404eba02b8a9d55aada3a6c64df421d0ec0d7288acc4727055274945d17483cd5710e73
-
SSDEEP
24576:lemjem3emOemsemyemDemTemHemnemmem2em+emTemXemBem6emFemWemRemiemH:i
Malware Config
Extracted
https://rentry.co/m7ebw9yf/raw
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 2400 WScript.exe 6 2400 WScript.exe -
Deletes itself 1 IoCs
pid Process 2400 WScript.exe -
pid Process 2212 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2212 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2212 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2460 2400 WScript.exe 32 PID 2400 wrote to memory of 2460 2400 WScript.exe 32 PID 2400 wrote to memory of 2460 2400 WScript.exe 32 PID 2460 wrote to memory of 2212 2460 cmd.exe 34 PID 2460 wrote to memory of 2212 2460 cmd.exe 34 PID 2460 wrote to memory of 2212 2460 cmd.exe 34
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\29a2f380dca14716c3e3c53da12df3d0b1fb5c3efd0d2b711d3de523a7273836.vbs"1⤵
- Blocklisted process makes network request
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\System32\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\WindowsUpdate\OOWZL.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -NoProfile -ExecutionPolicy Bypass -Command C:\Users\Admin\AppData\Roaming\WindowsUpdate\ZARTD.ps13⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75B
MD5c561282ed942d23889d0a4ed1222b87d
SHA13a201c4bbb160ee5c7089da864e018a1cdd2d02e
SHA256c9b0ba912bfafe244f38d31f13070116bb105123083ff1f05ed6cad9eaa626fe
SHA512bfc021f5d48d55aba88416340e996d7127993a349d23806fb64e715ad4840886e8d3af5a74745453f2d00e3b6fce22d8a34c312e2b3202bf6602be33b20067b3
-
Filesize
44KB
MD5da1cd4da7e21802269e159912b864ee4
SHA1d46e5ff9db8a7ac43555d2fd5607230209578c48
SHA2562a1a67c8cf9037b6da4ebd9cfe8c1c076f7a6211dd4eba150f1df36a0450a39b
SHA512788d55920f2cd21650baf4d4a54422e26b3edf374a1a4a438fd217930f4d66e3e8985e263a41586f6fa3fd2f032f9fa4e2fd41ba3067911781217da18d43bd44