General
-
Target
Payment_Activity_0037_2025-3-30.vbs
-
Size
13KB
-
Sample
250330-w6n9zatycw
-
MD5
1666b10f8f85c81a689e60018dd65abf
-
SHA1
40320e7700630bc0e35a11cc803cfa3ad46aa79b
-
SHA256
eb860d8529dd9d5a2277b1c340d8aa2db7eecdb172d57133038b8f90ce39bb31
-
SHA512
0cae1de09fc3d46a02541a6f34c931e4748f06fbf0add8fa89caccf5a9cbd68d15871453e70320b8d4fc23b75191b984ff47f87ba8dcdada5765628356fb20bc
-
SSDEEP
192:NB0v8qa258i+h6xp2YXBoN8x6kgqDMOhWm3Gmim3jzVcGZlIyB1AQaAMKz3N2v:3qyi0mdxoY6HyLjpLZlIyUQanKzN2v
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Activity_0037_2025-3-30.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payment_Activity_0037_2025-3-30.vbs
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Decrypt_files.txt
Targets
-
-
Target
Payment_Activity_0037_2025-3-30.vbs
-
Size
13KB
-
MD5
1666b10f8f85c81a689e60018dd65abf
-
SHA1
40320e7700630bc0e35a11cc803cfa3ad46aa79b
-
SHA256
eb860d8529dd9d5a2277b1c340d8aa2db7eecdb172d57133038b8f90ce39bb31
-
SHA512
0cae1de09fc3d46a02541a6f34c931e4748f06fbf0add8fa89caccf5a9cbd68d15871453e70320b8d4fc23b75191b984ff47f87ba8dcdada5765628356fb20bc
-
SSDEEP
192:NB0v8qa258i+h6xp2YXBoN8x6kgqDMOhWm3Gmim3jzVcGZlIyB1AQaAMKz3N2v:3qyi0mdxoY6HyLjpLZlIyUQanKzN2v
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Windows Management Instrumentation
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Ignore Process Interrupts
1Indicator Removal
2File Deletion
2Modify Registry
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1