Analysis

  • max time kernel
    134s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    01-11-2024 07:08

General

  • Target

    other malware cuz why not/loveletterworm fixed.vbs

  • Size

    4KB

  • MD5

    5c5cfc1e6e91a733e225cf6f39d74623

  • SHA1

    f0d2fc4eff812edb4e40db5c155b95aa9575e472

  • SHA256

    3fb3b4aa431e328c471b7fc814e662ffed93132209fffce2b996eb9ada66e727

  • SHA512

    ad42b84774fafd7363218e874b35aae6d3355efb442b036e6d7d0fed18ab665c5de5ef3bc84b8f13fee79f17ebd57b299dd2ac14401a33d897d5bffe46f8a3af

  • SSDEEP

    96:ekmO+aYCe4pz7A9dYaG+GrQU18YDMjryGvGdeVYPGFwrCZ76QJakfExKdy:1gCnpz7A9bvzEDgnVegYVqepkGOy

Malware Config

Signatures

  • Renames multiple (335) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\other malware cuz why not\loveletterworm fixed.vbs"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    PID:1596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\db\bin\derby_common.bat

    Filesize

    4KB

    MD5

    5c5cfc1e6e91a733e225cf6f39d74623

    SHA1

    f0d2fc4eff812edb4e40db5c155b95aa9575e472

    SHA256

    3fb3b4aa431e328c471b7fc814e662ffed93132209fffce2b996eb9ada66e727

    SHA512

    ad42b84774fafd7363218e874b35aae6d3355efb442b036e6d7d0fed18ab665c5de5ef3bc84b8f13fee79f17ebd57b299dd2ac14401a33d897d5bffe46f8a3af