Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/02/2025, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
Draft doc PI ITS15235.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Draft doc PI ITS15235.vbs
Resource
win10v2004-20250217-en
General
-
Target
Draft doc PI ITS15235.vbs
-
Size
2.2MB
-
MD5
82fe72e4395ab69063ae37812e097fa5
-
SHA1
96692be9dcd400a38be42fc651d755f41d923efc
-
SHA256
8c4334177584d7aee981ada042ff60124cd81a2e51e7c1514f7e2dd22f9335b4
-
SHA512
6866381b3c83d5516dc3ac34262d877714494cc6bcfd90fbc47214c94fe0e00bc8757ca06ab775e05362481d64fd11279a460d51be7d513b19150525010caa5a
-
SSDEEP
49152:jQ901eMu/JNdX1kXGyMaODU9cXx1YY0YYYYKYYcYYYfLtYsYYYtY/YYYYUFYYcY+:Q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3060 x.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3060 2552 WScript.exe 30 PID 2552 wrote to memory of 3060 2552 WScript.exe 30 PID 2552 wrote to memory of 3060 2552 WScript.exe 30 PID 2552 wrote to memory of 3060 2552 WScript.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Draft doc PI ITS15235.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5eba92cf15278af942976c5066229c1b0
SHA1a7583b64daaa78b8307f16151d3d6831a06f95a5
SHA256bdbac960456fcbde1d3a00e62aa39d33c9b36aedfadf14dff4b3c0fa452006d1
SHA51244e2ff5dfe7333222714d680743e7051979396db123fc98b2bc376f59e862b0cd920324c5682038f165c21b8023a329a8400eae2dd9ab3ec7769366190480e81