Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02-02-2024 22:13
Static task
static1
Behavioral task
behavioral1
Sample
a25ef143ea779565740ae42676a034135d13218bb08dd8e0bba5622fcfbc548e.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a25ef143ea779565740ae42676a034135d13218bb08dd8e0bba5622fcfbc548e.vbs
Resource
win10v2004-20231215-en
General
-
Target
a25ef143ea779565740ae42676a034135d13218bb08dd8e0bba5622fcfbc548e.vbs
-
Size
2KB
-
MD5
2739364af8db075cbbe82f9161fb5d8b
-
SHA1
bbf1a630746de540b8fad0ab858a9d205c3152f9
-
SHA256
a25ef143ea779565740ae42676a034135d13218bb08dd8e0bba5622fcfbc548e
-
SHA512
a13008edf830e08889c3b49591514c8e1057106b2ca555cb2e72fbbc74b7e7e74e5c805d8511ebac117b75b2f20944ff5a0fee498429df6613eab4c786729380
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2408 2060 WScript.exe 28 PID 2060 wrote to memory of 2408 2060 WScript.exe 28 PID 2060 wrote to memory of 2408 2060 WScript.exe 28 PID 2060 wrote to memory of 2664 2060 WScript.exe 29 PID 2060 wrote to memory of 2664 2060 WScript.exe 29 PID 2060 wrote to memory of 2664 2060 WScript.exe 29 PID 2408 wrote to memory of 2740 2408 cmd.exe 32 PID 2408 wrote to memory of 2740 2408 cmd.exe 32 PID 2408 wrote to memory of 2740 2408 cmd.exe 32 PID 2408 wrote to memory of 2788 2408 cmd.exe 35 PID 2408 wrote to memory of 2788 2408 cmd.exe 35 PID 2408 wrote to memory of 2788 2408 cmd.exe 35 PID 2664 wrote to memory of 2760 2664 cmd.exe 34 PID 2664 wrote to memory of 2760 2664 cmd.exe 34 PID 2664 wrote to memory of 2760 2664 cmd.exe 34 PID 2664 wrote to memory of 2676 2664 cmd.exe 33 PID 2664 wrote to memory of 2676 2664 cmd.exe 33 PID 2664 wrote to memory of 2676 2664 cmd.exe 33
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a25ef143ea779565740ae42676a034135d13218bb08dd8e0bba5622fcfbc548e.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Users\Admin\Desktop\Internat Explorer.html" /P Everyone:R2⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2740
-
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Desktop\Internat Explorer.html" /P Everyone:R3⤵PID:2788
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y| cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internat Explorer.html" /P Everyone:R2⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\system32\cacls.execacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internat Explorer.html" /P Everyone:R3⤵PID:2676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD516e5d16a1ad6b9f68adad2836694b730
SHA196a30a1dd3cfe79f602f7b3baf6943773b688172
SHA25625101505aacfa314773673d4adfaef69b10cec59a2ac521880401b802076a4a4
SHA512c68f5c523fd7b0d20d6093efc39975aec5250b0a3a5663a083ffe272e4797a275daa27f4179f76e83549f2f1207d8ff90d00ec1b86606f5ccc57c94ec1ff2c96