Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2024 22:14

General

  • Target

    a398dc51997020f58391c14df28f2ff3c0fab5441a02392198c4f8c4eadf0647.vbs

  • Size

    5KB

  • MD5

    cea2abd74d72709fa6b90172997e0aea

  • SHA1

    bb61857a4831a50400ff51519c74b63ae987441a

  • SHA256

    a398dc51997020f58391c14df28f2ff3c0fab5441a02392198c4f8c4eadf0647

  • SHA512

    bbcadf063b54a4c7db30aff1ecb2aab9ca57750c68450b0f248e43b3f61502386e3f041a6819629c821235d524ed3d7181980fbea2c2dbe93a2616f7c473bf0d

  • SSDEEP

    96:1Qt0p9Ab5yJcp/0WcXStgE2j208h6OEelg/p5rOBzFcR+Wg75tOBPFcR+WghWE:1PwGMgE2jXC66WrfgWMtbgWMn

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Blocklisted process makes network request 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a398dc51997020f58391c14df28f2ff3c0fab5441a02392198c4f8c4eadf0647.vbs"
    1⤵
    • Blocklisted process makes network request
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\System32\net.exe
      "C:\Windows\System32\net.exe" user startbug /add
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 user startbug /add
        3⤵
          PID:2612
      • C:\Windows\System32\net.exe
        "C:\Windows\System32\net.exe" user startbug startbug /add
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 user startbug startbug /add
          3⤵
            PID:2700
        • C:\Windows\System32\net.exe
          "C:\Windows\System32\net.exe" localgroup administrators startbug /add
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2780
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 localgroup administrators startbug /add
            3⤵
              PID:2804
          • C:\Windows\System32\net.exe
            "C:\Windows\System32\net.exe" stop themes
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2232
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 stop themes
              3⤵
                PID:2560
            • C:\Windows\System32\net.exe
              "C:\Windows\System32\net.exe" start themes
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1516
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 start themes
                3⤵
                  PID:860
              • C:\Windows\System32\net.exe
                "C:\Windows\System32\net.exe" stop themes
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2136
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 stop themes
                  3⤵
                    PID:1720
                • C:\Windows\System32\net.exe
                  "C:\Windows\System32\net.exe" start themes
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2960
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 start themes
                    3⤵
                      PID:2856

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Windows\hidestart.exe

                  Filesize

                  41KB

                  MD5

                  0ddd9bd4460b827dbf6b20dbf17fd04c

                  SHA1

                  11a0ddcf0b168fb859745d97cd28864e84496c08

                  SHA256

                  f99c7a088a444339d97a12b5342bc31914a43253ff2ea8b62d36cb30b438e0eb

                  SHA512

                  179e5e0fae812ab84f6a74db0949e02998f83e32f6b4f679171cb4e2133c333febe682b5b044feef5562661f60ef8ba842657859101ebcf26d5f82f75cba2088