Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
CreateWebApplication.vbs
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
CreateWebApplication.vbs
Resource
win10v2004-20231020-en
General
-
Target
CreateWebApplication.vbs
-
Size
3KB
-
MD5
595a79292a929caa4131517e31ba73c3
-
SHA1
a105f9b286290ffaf787ee739c74206c677f89f4
-
SHA256
7fb71a0b7ab2b2ae8cca47467dd1e4aa40bc1a927bf939469362c530b125a743
-
SHA512
728952faf4a1a81e9df793f1c510dc5a40ff54447db2fd11817ae2ae35d797a6c9f390b7220ac6bf7c13df9c3786ad9841c2ae15de9eaad86946213e2c7d9770
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3024 svchost.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\CreateWebApplication.vbs"1⤵PID:1552
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4576
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3024
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD53baac5e66d3ebc7ccbbcdcb5ee4c7cc2
SHA1a50b2c68c73e71b577db1bace9a1f68abe10b190
SHA256b84f3623aa76d777a383482114eff8e0f0c2085fb8d7deeef7545778f2ee36c1
SHA512742121c367703ab6258f5d1e495cc3b19310ad4bf94b00d235b5c6a67d58fd8b344af6e45f288de34b40b6db9231d58629854fab298b038100f6dee81b06ca35