Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2024, 22:08

General

  • Target

    908c8fe833a16ce8f1d48a66ca5e06bc3c9fe68f086c49b64b889d50223c9219.vbs

  • Size

    2KB

  • MD5

    e986d18aadd550c47e73af81aeb8f305

  • SHA1

    d60c5d8a25cc565392b26e8e2decad2be623e1e5

  • SHA256

    908c8fe833a16ce8f1d48a66ca5e06bc3c9fe68f086c49b64b889d50223c9219

  • SHA512

    9c503b2f331c7d41a29a0bed06243765752a307009f039396b20966ddacd41c71ef9fa00a23bf42cd10652b364ec09750f295d8481054175f7567e3b1e5cda9c

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\908c8fe833a16ce8f1d48a66ca5e06bc3c9fe68f086c49b64b889d50223c9219.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4992
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Users\Admin\Desktop\Internat Explorer.html" /P Everyone:R
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
        3⤵
          PID:4092
        • C:\Windows\system32\cacls.exe
          cacls "C:\Users\Admin\Desktop\Internat Explorer.html" /P Everyone:R
          3⤵
            PID:1252
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internat Explorer.html" /P Everyone:R
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2176
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
              PID:1312
            • C:\Windows\system32\cacls.exe
              cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internat Explorer.html" /P Everyone:R
              3⤵
                PID:3804

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internat Explorer.html

            Filesize

            147B

            MD5

            45532f37fe774f734a46f7d2737b7400

            SHA1

            d5c7cb1816c94bb46d89b69205520a0d83fa5416

            SHA256

            d1c05ffaa08a50b843803164b8ffa8f1a7bca4898218c8517e4c826a5af1ccad

            SHA512

            4c94359d6d659611d9f3d712266ecc7bae1fceca9f56822517955767a17da5a5e951b53861706e69fbd097251d7d5693fee90236fd3974e9a4b2d71034ffcfa7