Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2024 22:13

General

  • Target

    a25ef143ea779565740ae42676a034135d13218bb08dd8e0bba5622fcfbc548e.vbs

  • Size

    2KB

  • MD5

    2739364af8db075cbbe82f9161fb5d8b

  • SHA1

    bbf1a630746de540b8fad0ab858a9d205c3152f9

  • SHA256

    a25ef143ea779565740ae42676a034135d13218bb08dd8e0bba5622fcfbc548e

  • SHA512

    a13008edf830e08889c3b49591514c8e1057106b2ca555cb2e72fbbc74b7e7e74e5c805d8511ebac117b75b2f20944ff5a0fee498429df6613eab4c786729380

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a25ef143ea779565740ae42676a034135d13218bb08dd8e0bba5622fcfbc548e.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Users\Admin\Desktop\Internat Explorer.html" /P Everyone:R
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2408
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
        3⤵
          PID:2740
        • C:\Windows\system32\cacls.exe
          cacls "C:\Users\Admin\Desktop\Internat Explorer.html" /P Everyone:R
          3⤵
            PID:2788
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internat Explorer.html" /P Everyone:R
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2664
          • C:\Windows\system32\cacls.exe
            cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internat Explorer.html" /P Everyone:R
            3⤵
              PID:2676
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
                PID:2760

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internat Explorer.html

            Filesize

            147B

            MD5

            16e5d16a1ad6b9f68adad2836694b730

            SHA1

            96a30a1dd3cfe79f602f7b3baf6943773b688172

            SHA256

            25101505aacfa314773673d4adfaef69b10cec59a2ac521880401b802076a4a4

            SHA512

            c68f5c523fd7b0d20d6093efc39975aec5250b0a3a5663a083ffe272e4797a275daa27f4179f76e83549f2f1207d8ff90d00ec1b86606f5ccc57c94ec1ff2c96