Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
908c8fe833a16ce8f1d48a66ca5e06bc3c9fe68f086c49b64b889d50223c9219.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
908c8fe833a16ce8f1d48a66ca5e06bc3c9fe68f086c49b64b889d50223c9219.vbs
Resource
win10v2004-20231215-en
General
-
Target
908c8fe833a16ce8f1d48a66ca5e06bc3c9fe68f086c49b64b889d50223c9219.vbs
-
Size
2KB
-
MD5
e986d18aadd550c47e73af81aeb8f305
-
SHA1
d60c5d8a25cc565392b26e8e2decad2be623e1e5
-
SHA256
908c8fe833a16ce8f1d48a66ca5e06bc3c9fe68f086c49b64b889d50223c9219
-
SHA512
9c503b2f331c7d41a29a0bed06243765752a307009f039396b20966ddacd41c71ef9fa00a23bf42cd10652b364ec09750f295d8481054175f7567e3b1e5cda9c
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4992 wrote to memory of 2432 4992 WScript.exe 85 PID 4992 wrote to memory of 2432 4992 WScript.exe 85 PID 4992 wrote to memory of 2176 4992 WScript.exe 87 PID 4992 wrote to memory of 2176 4992 WScript.exe 87 PID 2432 wrote to memory of 4092 2432 cmd.exe 89 PID 2432 wrote to memory of 4092 2432 cmd.exe 89 PID 2432 wrote to memory of 1252 2432 cmd.exe 90 PID 2432 wrote to memory of 1252 2432 cmd.exe 90 PID 2176 wrote to memory of 1312 2176 cmd.exe 91 PID 2176 wrote to memory of 1312 2176 cmd.exe 91 PID 2176 wrote to memory of 3804 2176 cmd.exe 92 PID 2176 wrote to memory of 3804 2176 cmd.exe 92
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\908c8fe833a16ce8f1d48a66ca5e06bc3c9fe68f086c49b64b889d50223c9219.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Users\Admin\Desktop\Internat Explorer.html" /P Everyone:R2⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4092
-
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Desktop\Internat Explorer.html" /P Everyone:R3⤵PID:1252
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internat Explorer.html" /P Everyone:R2⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1312
-
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internat Explorer.html" /P Everyone:R3⤵PID:3804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD545532f37fe774f734a46f7d2737b7400
SHA1d5c7cb1816c94bb46d89b69205520a0d83fa5416
SHA256d1c05ffaa08a50b843803164b8ffa8f1a7bca4898218c8517e4c826a5af1ccad
SHA5124c94359d6d659611d9f3d712266ecc7bae1fceca9f56822517955767a17da5a5e951b53861706e69fbd097251d7d5693fee90236fd3974e9a4b2d71034ffcfa7