Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/02/2025, 19:05

General

  • Target

    Draft doc PI ITS15235.vbs

  • Size

    2.2MB

  • MD5

    82fe72e4395ab69063ae37812e097fa5

  • SHA1

    96692be9dcd400a38be42fc651d755f41d923efc

  • SHA256

    8c4334177584d7aee981ada042ff60124cd81a2e51e7c1514f7e2dd22f9335b4

  • SHA512

    6866381b3c83d5516dc3ac34262d877714494cc6bcfd90fbc47214c94fe0e00bc8757ca06ab775e05362481d64fd11279a460d51be7d513b19150525010caa5a

  • SSDEEP

    49152:jQ901eMu/JNdX1kXGyMaODU9cXx1YY0YYYYKYYcYYYfLtYsYYYtY/YYYYUFYYcY+:Q

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Draft doc PI ITS15235.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Users\Admin\AppData\Local\Temp\x.exe
      "C:\Users\Admin\AppData\Local\Temp\x.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\x.exe

    Filesize

    1.6MB

    MD5

    eba92cf15278af942976c5066229c1b0

    SHA1

    a7583b64daaa78b8307f16151d3d6831a06f95a5

    SHA256

    bdbac960456fcbde1d3a00e62aa39d33c9b36aedfadf14dff4b3c0fa452006d1

    SHA512

    44e2ff5dfe7333222714d680743e7051979396db123fc98b2bc376f59e862b0cd920324c5682038f165c21b8023a329a8400eae2dd9ab3ec7769366190480e81

  • memory/3060-7-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/3060-9-0x0000000000400000-0x00000000005A8000-memory.dmp

    Filesize

    1.7MB

  • memory/3060-8-0x00000000033D0000-0x00000000043D0000-memory.dmp

    Filesize

    16.0MB