General
-
Target
Payment_Activity_0037_2025-3-30.vbs
-
Size
13KB
-
Sample
250330-w8v6astyg1
-
MD5
257ea8ae99c0f328251eecebbb3c4301
-
SHA1
0f6c115c4169c73269ee17955cd6858f71bd9b45
-
SHA256
0d69c127cf01104b06b3407364bbd1c04ae5b6a831317b58d835c50ff9a0468c
-
SHA512
631c1e004e71412b05bf1fb919d26d303a16c3cfbc5bf5e0fdf44533fbd8e47e4cd1ad1e00a39dfd038c51eceaf6bb19404eca49756a657b623b4acccda37b71
-
SSDEEP
192:NB0v8qa258i+nxp2YXBoN8x6kgqDMOhWm3Gmim3jzVcGZlIyB1AQaAMKz3N2v:3qyiAdxoY6HyLjpLZlIyUQanKzN2v
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Activity_0037_2025-3-30.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payment_Activity_0037_2025-3-30.vbs
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Decrypt_files.txt
Targets
-
-
Target
Payment_Activity_0037_2025-3-30.vbs
-
Size
13KB
-
MD5
257ea8ae99c0f328251eecebbb3c4301
-
SHA1
0f6c115c4169c73269ee17955cd6858f71bd9b45
-
SHA256
0d69c127cf01104b06b3407364bbd1c04ae5b6a831317b58d835c50ff9a0468c
-
SHA512
631c1e004e71412b05bf1fb919d26d303a16c3cfbc5bf5e0fdf44533fbd8e47e4cd1ad1e00a39dfd038c51eceaf6bb19404eca49756a657b623b4acccda37b71
-
SSDEEP
192:NB0v8qa258i+nxp2YXBoN8x6kgqDMOhWm3Gmim3jzVcGZlIyB1AQaAMKz3N2v:3qyiAdxoY6HyLjpLZlIyUQanKzN2v
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Windows Management Instrumentation
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Ignore Process Interrupts
1Indicator Removal
2File Deletion
2Modify Registry
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1